Enviar pesquisa
Carregar
20120140504023
•
1 gostou
•
237 visualizações
IAEME Publication
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 9
Baixar agora
Baixar para ler offline
Recomendados
Malware detection techniques for mobile devices
Malware detection techniques for mobile devices
ijmnct
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
ijmnct
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
iosrjce
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET Journal
Malware Improvements in Android OS
Malware Improvements in Android OS
Pranav Saini
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
SytelReplyUK
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
IJIR JOURNALS IJIRUSA
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBR
ijtsrd
Recomendados
Malware detection techniques for mobile devices
Malware detection techniques for mobile devices
ijmnct
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
ijmnct
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
iosrjce
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET Journal
Malware Improvements in Android OS
Malware Improvements in Android OS
Pranav Saini
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
SytelReplyUK
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
IJIR JOURNALS IJIRUSA
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBR
ijtsrd
Taxonomy mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
csandit
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
CSCJournals
Review on mobile threats and detection techniques
Review on mobile threats and detection techniques
ijdpsjournal
Report on Mobile security
Report on Mobile security
Kavita Rastogi
Article on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
Implementing security on android application
Implementing security on android application
IAEME Publication
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
TestingXperts
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices a survey
IAEME Publication
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...
eSAT Journals
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
eSAT Journals
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
karishmakittu
HinDroid
HinDroid
HinDroid
P01761113118
P01761113118
IOSR Journals
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
IRJET Journal
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”
iosrjce
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ijitcs
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
IRJET Journal
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET Journal
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
Anjoum .
20320130406003 2-3
20320130406003 2-3
IAEME Publication
50120130406006
50120130406006
IAEME Publication
Mais conteúdo relacionado
Mais procurados
Taxonomy mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
csandit
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
CSCJournals
Review on mobile threats and detection techniques
Review on mobile threats and detection techniques
ijdpsjournal
Report on Mobile security
Report on Mobile security
Kavita Rastogi
Article on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
Implementing security on android application
Implementing security on android application
IAEME Publication
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
TestingXperts
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices a survey
IAEME Publication
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...
eSAT Journals
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
eSAT Journals
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
karishmakittu
HinDroid
HinDroid
HinDroid
P01761113118
P01761113118
IOSR Journals
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
IRJET Journal
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”
iosrjce
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ijitcs
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
IRJET Journal
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET Journal
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
Anjoum .
Mais procurados
(20)
Taxonomy mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
Review on mobile threats and detection techniques
Review on mobile threats and detection techniques
Report on Mobile security
Report on Mobile security
Article on Mobile Security
Article on Mobile Security
Implementing security on android application
Implementing security on android application
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices a survey
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
HinDroid
HinDroid
P01761113118
P01761113118
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
Destaque
20320130406003 2-3
20320130406003 2-3
IAEME Publication
50120130406006
50120130406006
IAEME Publication
10120140504017
10120140504017
IAEME Publication
10220130403003
10220130403003
IAEME Publication
A pattern diversity compact mimo antenna array design for wlan
A pattern diversity compact mimo antenna array design for wlan
IAEME Publication
20320140504005
20320140504005
IAEME Publication
50120130406005
50120130406005
IAEME Publication
An empirical large signal model for rf ldmosfet transistors
An empirical large signal model for rf ldmosfet transistors
IAEME Publication
An empirical large signal model for rf ldmosfet transistors
An empirical large signal model for rf ldmosfet transistors
IAEME Publication
Destaque
(9)
20320130406003 2-3
20320130406003 2-3
50120130406006
50120130406006
10120140504017
10120140504017
10220130403003
10220130403003
A pattern diversity compact mimo antenna array design for wlan
A pattern diversity compact mimo antenna array design for wlan
20320140504005
20320140504005
50120130406005
50120130406005
An empirical large signal model for rf ldmosfet transistors
An empirical large signal model for rf ldmosfet transistors
An empirical large signal model for rf ldmosfet transistors
An empirical large signal model for rf ldmosfet transistors
Semelhante a 20120140504023
A017360104
A017360104
IOSR Journals
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
AM Publications
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
IOSR Journals
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...
IJECEIAES
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
IRJET Journal
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET Journal
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
IJNSA Journal
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
IJNSA Journal
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Idexcel Technologies
Ppt crc nazir_seeds
Ppt crc nazir_seeds
Nazir Dar
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
IJCNCJournal
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
IRJET Journal
Ijmet 10 01_095
Ijmet 10 01_095
IAEME Publication
IRJET- Root Security Firewall
IRJET- Root Security Firewall
IRJET Journal
IRJET- Root Security Firewall
IRJET- Root Security Firewall
IRJET Journal
Penetration Testing for Android Smartphones
Penetration Testing for Android Smartphones
IOSR Journals
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
IAEME Publication
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
ijwmn
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
IJECEIAES
Irjet v7 i3811
Irjet v7 i3811
aissmsblogs
Semelhante a 20120140504023
(20)
A017360104
A017360104
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Ppt crc nazir_seeds
Ppt crc nazir_seeds
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
Ijmet 10 01_095
Ijmet 10 01_095
IRJET- Root Security Firewall
IRJET- Root Security Firewall
IRJET- Root Security Firewall
IRJET- Root Security Firewall
Penetration Testing for Android Smartphones
Penetration Testing for Android Smartphones
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
Irjet v7 i3811
Irjet v7 i3811
Mais de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Mais de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
The Digital Insurer
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
apidays
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
apidays
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Último
(20)
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
20120140504023
1.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 213 A NOVEL METHODOLOGY FOR ANALYZING MALICIOUS BEHAVIOR OF THE ANDROID APPLICATIONS Namrata A. Patel1 , Vijay Ukani2 , Nilay Mistry3 1, 2 Department of Computer Science & Engg, Institute of Technology, Nirma University, Ahmedabad, India, 3 Asst. Professor, Department of Digital Forensic Division, Gujarat Forensic Sciences University, Gandhinagar, India ABSTRACT Smart phones have evolved from simple mobile phones into sophisticated yet compact minicomputers. Mobile gimmicks become vulnerable to various threats such as viruses, worms, trojan horses and malwares. Until some sealed security measures like application signing and validation of developers was introduced, the number of infected applications steadily increased. Smart phones run on Android OS are one that continues to be a prime target for hackers. Our focus is mainly on Android-powered mobile device applications. In these days for smart phones, Android has become a very popular operating system. As we all aware, Android is a Linux-based operating system. With this operating system user can easily share applications via online market store i.e. Google market store. But, this platform includes different types of malicious applications. Because malware on device can create numerous risks, which create problems while connectivity because of security consequences. In this paper, it will be described that using methodology how we can analyze malicious behavior of the Android applications so that users can safely use the android smart phones. Keywords: Android Mobile Malware, Static Analysis, Dynamic Analysis, Reverse Engineering, Smartphone Security. I. INTRODUCTION The speedy gain in smart phone users has enabled the application marketplace to develop extensively. The black market presence has also risen quickly, where paid applications are altered for free transfer. As an outcome, malicious applications are anticipated to disseminate with raising frequency [1]. INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2014): 7.8273 (Calculated by GISI) www.jifactor.com IJARET © I A E M E
2.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 214 An Android is an open source operating system. Android smart phones offer advanced computing ability and connectivity as compared to other mobile operating systems. Android was initially originated by Android Inc. and was afterward purchased by Google. Android is a Linux based operating system. It was made for touch screen devices like smart phones, tablets, cameras, set-top boxes, etc. and has attained the hands of millions of users. The architecture of android operating system is designed in such manner so that communication at application level and end user will be quite promiscuous. Android applications are coded in Java, a programming language [7]. But Android has its own virtual machine i.e. DVM (Dalvik Virtual Machine) and to execute the android applications, DVM is used. Android operating system is also used for business purposes. Risk will be high in business level because people are transmitting sensitive information from one end to another end. As Android allows remote access to official sensitive data e.g. personal information, which can lead to data hack if smart phones are hacked into. For this intension of protection, Google has designed their operating system to execute applications in specified sandboxes, which understate the potentiality of malware attacks to the applications in smart phones [2]. Due to convenient features inherent in smart phones, the number of smart phone users is rapidly increasing. People use smart phones for various purposes such as web brows- ing, calling, SMS, social networking, omnipresent access, and so on. Any technology that is in a lot of hands is a target for malicious applications. Why not? Both official smart phone application markets such as the Apples AppStore and Googles Android Market and nonofficial third party application markets called Black markets have been growing at an eminent rate. However, as the Android Market and Blackmarkets accept applications without any code review or security checks, hackers can easily disseminate their malicious applications into the Android Market. That is, hackers can manipulate any popular application from the market and repackage it to include malicious code. Trojan-SMS. AndroidOS first appeared in August, 2010, Geinimi in December, 2010 and Android/Spyware.PJApps.a in March, 2011, Gingerbreak in August, 2011. This represents the major types of Android malware [6]. The below chart illustrates worldwide smart phone operating system market share from Q1 2010 through Q1 2013[3]. All figures are based on unit sales to end users. Fig. 1: Android market [3]
3.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 215 II. OBJECTIVE AND DEFINITIONS The objective of this research paper is Suspicious Activity Assessment. The below figure shows the major parts of malware analysis. Fig. 2: Malware Analysis Static analysis involves human work to trace and examine malware, is more common because of the comparatively small number of mobile malware. Static analysis can provide higher quality results and lead to a better understanding [4]. On the other hand, Dynamic analysis involves automated tools to execute the malware in a controlled system environment and check for malicious forms. Therefore a large sample of malware can studied rapidly. Dynamic analysis is not yet common for mobile devices because of the trouble of replicating the numerous mobile hardware, mobile operating systems, and their many different versions [4]. Mobile malware also have different ways of spreading as opposed to desktop malware, which further makes dynamic analysis more difficult. Obfuscation and encryption are quite common for mobile malware, which also demand for extra steps in the analysis. Other sophisticated techniques for evasion used by mobile malware include polymorphism (changing variables and files), and steganography (hiding information in unexpected places). Reverse Engineering is a process of analyzing an existing code or piece of software in order to scrutinize the software for any vulnerability or any errors [5]. "Reverse engineering can therefore be stated as a method or process of modifying a program in order to make it behave in a manner that the reverse engineer desires." III. DETAILS OF OURANALYSIS METHODS Our intention as a part of this effort is to identify unauthorized actions of applications that are not initiated by users. Such activity may be triggered via background running process or self running script. Our initiation is to characterize programs by statically examining how many such operations (data or system resource access) found in the application. Mobile apps typically have intense user interaction, allowing us to approximate implicit user intention with explicit user inputs and actions. The control flow user interaction procedure is used in this section to describe the analysis. The algorithm performs the following high level steps.
4.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 216 The final conclusion depends on two step analysis as below. Scenario 1) Check for Behavior and permissions violation of an app Scenario 1.1) The first analysis is for those applications which are designed to use only in offline mode (like some games) but uses internet besides user knowledge. Hacker may use such behavior to transfer sensitive data. Initially the apk file will be decompiled with the steps described in the static analysis flow. As a result we will have a source code for the application installed. Then with the help of String tokenize algorithm every line of code will scan and check for the specific keyword. Scenario 1.2) Second attempt is for those applications which runs on internet but connect with more than one service end point (URL). This indicates some malicious activity without user knowledge. Some sensitive data may transfer to hacker via second endpoint. Below figure displays Flow Diagram of Scenario 1. Fig. 3: Flow Diagram of Scenario 1 As a result of the above mentioned processing, the malicious count can be calculated depending on the below equation. Malicious Count(X %) = No. of malicious occurrences *100 (1) Total No. of lines Scenario 2) No coupled unused or dead code without User interaction Static code analysis which is having some lines of code and which do not have coupling with user action. It means those lines of code which will never going to call by any action.
5.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 217 Below figure shows the Dependence Diagram of Scenario 2. Fig. 4: Dependence Diagram of Scenario 2 Logically every user action will create method dependent virtual path within the code. These paths are dependent on use-cases of individual application. After every possible virtual path, if we found some classes or methods which is not mapped with any virtual path node then those lines could be used for malicious activities as those were never called by any user action. Different equation will be used to generate the malicious count from scenario 2. This time we will use the number of dead or unused lines of code which never had been called from any user action. Malicious Count(Y %) = No. of unused lines * 100 (2) Total No. of lines Finally the average value of the result one and two makes the final output result of any application as below, Final malicious Count (C %) = X + Y (3) 2 IV. IMPLEMENTATION Android framework provides simplified utilities to develop quick Android applications. In eclipse version 3.5, Android plug-in(s) have been installed which provides developer friendly environment [10]. All the approaches defined in above sections were implemented in a small application to have a better look on how this approach can work for future industrial use.
6.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 218 The intention behind this project is to generate malware count report for every application installed on any android device. As android executable (.apk) does not give the direct source code, with the help of some technique we have to first generate the source code out of the apk file. As a first step the android framework has to install where the apk file will be process for decompilation. As a result of apk decompilation the artifacts will be generated as below [5]. Res folder: This folder comprises XMLs specifying the attributes, layout, drawables, languages, etc. Android Manifest File: This file is one of the most essential XML file which contains information about the permissions that the application needs or accesses. In other words this file contains the Meta data regarding the application. Smali folder: This folder comprises the source code of the application in .smali format. Then the next step is to convert .dex files into jar files. The Jar file will contain all the third party libraries and source code in .class format. Class files are byte code version of java source which is non human readable. In the next step we will convert that into .java file. Below figure displays Flow Diagram of the project. Fig. 5: Flow diagram Once we have the source code with us, all the approaches which we discussed in section 3 are implemented programmatically to analyze the code for malicious activity. After this process the report will be generated, this indicates the malicious count in percentage for each application installed. To demonstrate the concept of Malware analysis, a sample application was created. This application will implement the fundamentals of Malware detection and generates malicious count. This application can run on any android version. Below images shows how the application will look like. Figure 6.1 displays the main screen of the application. When user starts processing the application, it will start scanning for malwares. This scenario is shown in Figure 6.2. As a result the output will be shown to the user in well defined format as shown in Figure 7.
7.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 219 Fig. 7: Final Output
8.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 220 Below figure displays Comparison of the different applications in percentage. 17 0.3 6.1 17.32 19.27 4.62 2.83 13.54 0 5 10 15 20 25 ApplicationName Fig. 8: Graphical Analysis V. CONCLUSION Overall, malware analysis is a stimulating and ambitious area of computer security research. The complication which we have gone through in malware analysis is only one area of the security profession that is invariably evolving. The most appropriate way of understanding malwares is by studying the working of an already existing malware. Our initiative with this research is an effort to protect against threats in this huge security issues in mobile device. VI. ACKNOWLEDGEMENTS This research was supported by the Institute of Technology, Nirma University, Ahmedabad, India and Gujarat Forensic Sciences University, Gandhinagar, India. VII. REFERENCES [1] S.-H. Seo, D.-G. Lee, and K. Yim, “Analysis on maliciousness for mobile applications," in Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on, pp. 126-129, IEEE, 2012. [2] A. G. Kirandeep, “Implementing security on android application," in The International Journal of Engineering and Science (IJES) Volume 2, Issue 3, pp.56-59, IJES, 2013. [3] “Androidmarket."http://www.statista.com/topics/840/smartphones/chart/1099/smartphone- operating-system-market-share/. [4] E. Erturk, “A case study in open source software security and privacy: Android adware," in Internet Security (WorldCIS), 2012 World Congress on, pp. 189-191, IEEE, 2012. [5] Stephen. A.Ridley, "Android Malware Reverse Engineering", Retrieved from: http://dl.dropbox.com/u/2595211/HelloMotoAndroidReversing. [6] A. Shabtai, “Malware detection on mobile devices," in Mobile Data Management (MDM), 2010 Eleventh International Conference on, pp. 289-290, IEEE, 2010.
9.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 221 [7] A.-D. Schmidt, H.-G. Schmidt, L. Batyuk, J. H. Clausen, S. A. Camtepe, S. Albayrak, and C. Yildizli, “Smartphone malware evolution revisited: Android next target?," in Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, pp. 1-7, IEEE, 2009. [8] “Comparison of dalvik and java bytecode." http://forensics.spreitz-enbarth.de/2012/08/27/comparison-of-dalvik-and-java-bytecode/. [9] T. Eder, M. Rodler, D. Vymazal, and M. Zeilinger, “Ananas a framework for analyzing android applications," in Availability, Reliability and Security (ARES), 2013, Eighth International Conference on, pp. 711-719, IEEE, 2013. [10] Installing the Eclipse Plugin, Android Developers developer.android.com/sdk/installing/installing-adt.html [11] A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, “andromaly: a behavioral malware detection framework for android devices," Journal of Intelligent Information Systems, vol. 38, no. 1, pp. 161-190, 2012. [12] I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, “Crowdroid: behavior-based malware detection system for android," in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pp. 15-26, ACM, 2011. [13] H. Lemoine, “The dyana framework dynamic analysis for android," [14] “Reverse engineering definition." http://searchcio-midmarket.techtarget.com/definition/reverse-engineering. [15] “Android sdk tool." https://developer.android.com/sdk/index.html. [16] ”Jd-gui tool." http://jd.benow.ca/ [17] Alappanavar, P. B., Ms Ankeeta Bhujbal, and Mr Shantanu Deshmukh. "INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)." Journal Impact Factor 4.2 (2013): 237-240. [18] Asokan M, “Android Vs iOS – An Analysis”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 377 - 382, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [19] Kirandeep and Anu Garg, “Implementing Security on Android Application”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 576 - 589, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [20] Anirudha A. Kolpyakwar, Sonal Honale, Piyush M. Dhande and Pallavi A. Chaudhari, “A Review on Cloud-Based Intrusion Detection System for Android Smartphones”, International Journal of Advanced Research in Engineering & Technology (IJARET), Volume 4, Issue 6, 2013, pp. 238 - 245, ISSN Print: 0976-6480, ISSN Online: 0976-6499. [21] A.Edwinrobert and Dr.M.Hemalatha, “Behavioral and Performance Analysis Model for Malware Detection Techniques”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 141 - 151, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
Baixar agora