ResearchSpace

How to tame your android malware

Show simple item record

dc.contributor.author Burke, Ivan D
dc.contributor.author Pieterse, Heloise
dc.date.accessioned 2015-11-12T07:39:50Z
dc.date.available 2015-11-12T07:39:50Z
dc.date.issued 2015-03
dc.identifier.citation Burke, I and Pieterse, H. 2015. How to tame your android malware. In: 10th International Conference on Cyber Warfare and Security, Kruger National Park, South Africa, 24-25 March 2015, pp 54-65. en_US
dc.identifier.uri http://hdl.handle.net/10204/8266
dc.identifier.uri https://www.academia.edu/29265003/How_to_Tame_Your_Android_Malware
dc.identifier.uri https://www.researchgate.net/publication/274255324_How_to_Tame_Your_Android_Malware
dc.description Abstract Only. en_US
dc.description.abstract The Android mobile market has expanded greatly in recent years, but with its increased market share Android became a popular target for malware developers. The latest Anti-Virus reports suggest that Android account for the majority of malware detected on mobile devices. This is largely due to the open nature of Android development and the level of system utilities Android software developers are given access to. This paper reviews the currently available open source solutions available, for analysing mobile malware. In this paper the authors, provide an overview of the anatomy of an Android applications. Several malware analysis tools and reverse engineering tools have been developed to analyse and deconstruct APK files. The paper presents a method by which common open source tools can be used to dissect the APK file to uncover its intent. To conclude the authors identify the current shortcomings, with regards to currently available open source software, when it comes to the classification of malicious Android applications. en_US
dc.language.iso en en_US
dc.relation.ispartofseries Worklist;15832
dc.subject Mobile infection vectors en_US
dc.subject Malware developers en_US
dc.subject Malware analysis tools en_US
dc.subject Android mobiles en_US
dc.subject Reverse engineering en_US
dc.subject Open source tools en_US
dc.title How to tame your android malware en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Burke, I. D., & Pieterse, H. (2015). How to tame your android malware. http://hdl.handle.net/10204/8266 en_ZA
dc.identifier.chicagocitation Burke, Ivan D, and Heloise Pieterse. "How to tame your android malware." (2015): http://hdl.handle.net/10204/8266 en_ZA
dc.identifier.vancouvercitation Burke ID, Pieterse H, How to tame your android malware; 2015. http://hdl.handle.net/10204/8266 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Burke, Ivan D AU - Pieterse, Heloise AB - The Android mobile market has expanded greatly in recent years, but with its increased market share Android became a popular target for malware developers. The latest Anti-Virus reports suggest that Android account for the majority of malware detected on mobile devices. This is largely due to the open nature of Android development and the level of system utilities Android software developers are given access to. This paper reviews the currently available open source solutions available, for analysing mobile malware. In this paper the authors, provide an overview of the anatomy of an Android applications. Several malware analysis tools and reverse engineering tools have been developed to analyse and deconstruct APK files. The paper presents a method by which common open source tools can be used to dissect the APK file to uncover its intent. To conclude the authors identify the current shortcomings, with regards to currently available open source software, when it comes to the classification of malicious Android applications. DA - 2015-03 DB - ResearchSpace DP - CSIR KW - Mobile infection vectors KW - Malware developers KW - Malware analysis tools KW - Android mobiles KW - Reverse engineering KW - Open source tools LK - https://researchspace.csir.co.za PY - 2015 T1 - How to tame your android malware TI - How to tame your android malware UR - http://hdl.handle.net/10204/8266 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record