Armagedroid, APKs Static Analyzer Software

نویسندگان

  • Luis Enrique Héctor Almaraz García
  • Eleazar Aguirre Anaya
  • Ponciano Jorge Escamilla-Ambrosio
  • Raúl Acosta Bermejo
چکیده

Armagedroid, a software for static analysis of Android APKs, arises with the objective of assisting in the decision making by the user analyst, who must evaluate, thanks to the metadata obtained by the program, if it is a reliable package or a possible malware application, automating the procedures involved in this type of analysis. Consistent phases of the Armagedroid analysis consider the APK structure, its contents, its manifest file to extract the package, permissions and archive activities using action modules. The result obtained with the use of the tool is the gathered information from each module applied to a benign APK and one with malware, which, once compared, distinguish that the malicious package requests more permissions than the trusted APK and with just having an activity. The contributions of Armagedroid in comparison with other programs of static analysis are: the validation that the file loaded in memory is really an APK, checking its size, obtaining its content and generating the analysis report of the APK which consists of the information of the metadata obtained from the APK: the name, size in bytes, integrity checksums, which are MD5, SHA1 and SHA256, APK content , information of the files it contains, the name of the package, the list of activities and permissions of the APK in order to make the results known to the user.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Android Application Protection against Static Reverse Engineering based on Multidexing

DEX files are executable files of Android applications. Since DEX files are in the format of Java bytecodes, their Java source codes can be easily obtained using static reverse engineering tools. This results in numerous Android application thefts. There are some tools (e.g. bangcle, ijiami, liapp) that protect Android applications against static reverse engineering utilizing dynamic code loadi...

متن کامل

Revisiting Static Analysis of Android Malware

The mobile malware threat is fought by both static and dynamic analysis, two complementary approaches in need of constant sharpening. In this paper, static analysis is revisited to update and deepen knowledge about Android malware, correlate malicious samples through common artifacts, and further understand malware developers’ modus operandi. By looking at more than 200,000 malware samples, our...

متن کامل

A Static Analyzer for Model Transformations

Adoption of the Model-Driven Architecture approach is increasing each day. As any other software development project, a MDA-based project is constantly evolving given that software requirements change along their lifecycle. Thus, changes in MDA transformations are also frequent. These changes are hard and error-prone tasks when manually accomplished. We propose a static analyzer for inspecting ...

متن کامل

Taking Static Analysis to the Next Level: Proving the Absence of Run-Time Errors and Data Races with Astrée

We present an extension of Astrée to concurrent C software. Astrée is a sound static analyzer for run-time errors previously limited to sequential C software. Our extension employs a scalable abstraction which covers all possible thread interleavings, and soundly reports all run-time errors and data races: when the analyzer does not report any alarm, the program is proven free from those classe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Research in Computing Science

دوره 138  شماره 

صفحات  -

تاریخ انتشار 2017