An Assess Android Antimalware that Detects Malicious Dynamic Code in Apps

نویسنده

  • Chetan Shelke
چکیده

-Android is currently the most popular operating system and a considerable number of Smartphone’s, tablet computers ship with Android. However, users feel their private information at threat, facing a rapidly increasing number of malware for Android which significantly exceeds that of other platforms. Antimalware’s software promises to effectively protect against malware on Smartphone’s and many products are available for free or at reasonable prices. We systematically analyze the security implications of the ability to load malicious dynamic code in Android apps. We assess an Android Antimalware software tool to detect attempts to load malicious code and from the study of many online applications we observed, that malicious code is loaded in an unprotected way is a major issue. We also show how malware can use code-loading techniques to avoid detection by exploiting a conceptual weakness in current Android malware protection.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scalable Traffic Dependence Analysis for Detecting Android Malware Activities

The openness of Android application development mechanism poses security challenges to smartphone users. Malicious apps (malware) may be created by repackaging popular apps. At runtime, they directly fetch and run code on-thefly without the user’s knowledge [6]. Thereafter, malicious apps may spy on the victim users, stealthily collect and exfiltrate user’s information. Therefore, they threaten...

متن کامل

Dynamic Analysis System for Detecting Remote Server-Side Polymorphic Malicious Mobile Apps on Android based Smartphone

As Android malware is evolving quickly, malware creators are starting to develop new kinds of threats such as remote server-side polymorphic malicious code for Android platform that are being actively generated and distributed via the official Android Markets. Remote server-side polymorphic mobile apps can’t be detected correctly as those apps contain spyware and trojans as a hidden undetectabl...

متن کامل

DroidCat: Unified Dynamic Detection of Android Malware

Various dynamic approaches have been developed to detect or categorize Android malware. These approaches execute software, collect call traces, and then detect abnormal system calls or sensitive API usage. Consequently, attackers can evade these approaches by intentionally obfuscating those calls under focus. Additionally, existing approaches treat detection and categorization of malware as sep...

متن کامل

Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy

Current static analysis techniques for Android applications operate at the Java level—that is, they analyze either the Java source code or the Dalvik bytecode. However, Android allows developers to write code in C or C++ that is cross-compiled to multiple binary architectures. Furthermore, the Java-written components and the native code components (C or C++) can interact. Native code can access...

متن کامل

ریسک سنج: ابزاری برای سنجش دقیق میزان ریسک امنیتی برنامه‌ها در دستگاه‌های همراه

Nowadays smartphones and tablets are widely used due to their various capabilities and features for end users. In these devices, accessing a wide range of services and sensitive information including private personal data, contact list, geolocation, sending and receiving messages, accessing social networks and etc. are provided via numerous application programs. These types of accessibilities, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014