Burke, Ivan DPieterse, Heloise2015-11-122015-11-122015-03Burke, I and Pieterse, H. 2015. How to tame your android malware. In: 10th International Conference on Cyber Warfare and Security, Kruger National Park, South Africa, 24-25 March 2015, pp 54-65.http://hdl.handle.net/10204/8266https://www.academia.edu/29265003/How_to_Tame_Your_Android_Malwarehttps://www.researchgate.net/publication/274255324_How_to_Tame_Your_Android_MalwareAbstract Only.The Android mobile market has expanded greatly in recent years, but with its increased market share Android became a popular target for malware developers. The latest Anti-Virus reports suggest that Android account for the majority of malware detected on mobile devices. This is largely due to the open nature of Android development and the level of system utilities Android software developers are given access to. This paper reviews the currently available open source solutions available, for analysing mobile malware. In this paper the authors, provide an overview of the anatomy of an Android applications. Several malware analysis tools and reverse engineering tools have been developed to analyse and deconstruct APK files. The paper presents a method by which common open source tools can be used to dissect the APK file to uncover its intent. To conclude the authors identify the current shortcomings, with regards to currently available open source software, when it comes to the classification of malicious Android applications.enMobile infection vectorsMalware developersMalware analysis toolsAndroid mobilesReverse engineeringOpen source toolsHow to tame your android malwareConference PresentationBurke, I. D., & Pieterse, H. (2015). How to tame your android malware. http://hdl.handle.net/10204/8266Burke, Ivan D, and Heloise Pieterse. "How to tame your android malware." (2015): http://hdl.handle.net/10204/8266Burke ID, Pieterse H, How to tame your android malware; 2015. http://hdl.handle.net/10204/8266 .TY - Conference Presentation AU - Burke, Ivan D AU - Pieterse, Heloise AB - The Android mobile market has expanded greatly in recent years, but with its increased market share Android became a popular target for malware developers. The latest Anti-Virus reports suggest that Android account for the majority of malware detected on mobile devices. This is largely due to the open nature of Android development and the level of system utilities Android software developers are given access to. This paper reviews the currently available open source solutions available, for analysing mobile malware. In this paper the authors, provide an overview of the anatomy of an Android applications. Several malware analysis tools and reverse engineering tools have been developed to analyse and deconstruct APK files. The paper presents a method by which common open source tools can be used to dissect the APK file to uncover its intent. To conclude the authors identify the current shortcomings, with regards to currently available open source software, when it comes to the classification of malicious Android applications. DA - 2015-03 DB - ResearchSpace DP - CSIR KW - Mobile infection vectors KW - Malware developers KW - Malware analysis tools KW - Android mobiles KW - Reverse engineering KW - Open source tools LK - https://researchspace.csir.co.za PY - 2015 T1 - How to tame your android malware TI - How to tame your android malware UR - http://hdl.handle.net/10204/8266 ER -