Android Malware: Study and analysis of malware for privacy  leak in ad-hoc network 

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 12, Issue 3

Abstract

 Smartphone’s users has been increasing since last few years which provides numerous operations like accessing information through online mode, payment options, using utility applications, playing games.  Smartphone’s have become so powerful these days that tends to play the role of PC’s. The basic operation of  any mobile phone calling, storing personal details like contact information in contact book, business data, text  messages etc. Since we are in new generation, where so many different varieties of devices connect together  with each other giving way for security concerns. With the huge and tremendous uprising Smartphone sales in  market, the chances of malicious attacks became a trouble. As malware developers tries to steal information  from such devices. This paper provides a study of analyzing malware through static and dynamic means. In  static analysis we are performing reverse engineering to detect malicious code and in dynamic analysis we are  using tools to identify the packet structure. Further we perform white listing for safe destination address. In this  paper we are highlighting the aspects of mobile malware when compared with third party applications like Lookout etc

Authors and Affiliations

Akash Malhotra

Keywords

Related Articles

 Client-Server Model

 Client- server is a system that performs both the functions of client and server so as to promote the sharing of information between them. It allows many users to have access to the same database at the same time...

 Thorny Issues of Stakeholder Identification and Prioritization in  Requirement Engineering Process

 Identifying the stakeholder in requirement engineering process is one of the critical issues. It performs a remarkable part for successful project completion. The software project largely depends on several &nbsp...

Role of Fuzzy Set in Students’ Performance Prediction

Abstract: We can use educational data mining to predict student’ performance on the basis of different attribute. In this paper, the classification task is used to predict the result of students. Decision tree (DT) learn...

 An Adaptive approach to retrieve image affected by impulse noisefrom documents

Abstract: Impulsive noise is sometimes called salt-and-pepper noise or spike noise is most oftenly occuringimage detoriation. An image containing salt-and-pepper noise will have dark pixels in bright regions and brightpi...

 Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersive Routes

 In a Wireless Sensor Network (WSN), specifically data aggregation reduces the amount of communication and energy utilization. Newly, the research centre has proposed a strong aggregation framework call...

Download PDF file
  • EP ID EP115018
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

Akash Malhotra (2013).  Android Malware: Study and analysis of malware for privacy  leak in ad-hoc network . IOSR Journals (IOSR Journal of Computer Engineering), 12(3), 39-43. https://europub.co.uk/articles/-A-115018