Android Malware: Study and analysis of malware for privacy leak in ad-hoc network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 12, Issue 3
Abstract
Smartphone’s users has been increasing since last few years which provides numerous operations like accessing information through online mode, payment options, using utility applications, playing games. Smartphone’s have become so powerful these days that tends to play the role of PC’s. The basic operation of any mobile phone calling, storing personal details like contact information in contact book, business data, text messages etc. Since we are in new generation, where so many different varieties of devices connect together with each other giving way for security concerns. With the huge and tremendous uprising Smartphone sales in market, the chances of malicious attacks became a trouble. As malware developers tries to steal information from such devices. This paper provides a study of analyzing malware through static and dynamic means. In static analysis we are performing reverse engineering to detect malicious code and in dynamic analysis we are using tools to identify the packet structure. Further we perform white listing for safe destination address. In this paper we are highlighting the aspects of mobile malware when compared with third party applications like Lookout etc
Authors and Affiliations
Akash Malhotra
Client-Server Model
Client- server is a system that performs both the functions of client and server so as to promote the sharing of information between them. It allows many users to have access to the same database at the same time...
Thorny Issues of Stakeholder Identification and Prioritization in Requirement Engineering Process
Identifying the stakeholder in requirement engineering process is one of the critical issues. It performs a remarkable part for successful project completion. The software project largely depends on several  ...
Role of Fuzzy Set in Students’ Performance Prediction
Abstract: We can use educational data mining to predict student’ performance on the basis of different attribute. In this paper, the classification task is used to predict the result of students. Decision tree (DT) learn...
An Adaptive approach to retrieve image affected by impulse noisefrom documents
Abstract: Impulsive noise is sometimes called salt-and-pepper noise or spike noise is most oftenly occuringimage detoriation. An image containing salt-and-pepper noise will have dark pixels in bright regions and brightpi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersive Routes
In a Wireless Sensor Network (WSN), specifically data aggregation reduces the amount of communication and energy utilization. Newly, the research centre has proposed a strong aggregation framework call...