DocumentCode
118676
Title
Identifying Android malware instructions
Author
Morales Medina, Laura Victoria ; Rueda, Sandra Julieta
Author_Institution
Syst. & Comput. Eng. Dept., Univ. de los Andes, Andes, Colombia
fYear
2014
fDate
5-7 Nov. 2014
Firstpage
1
Lastpage
7
Abstract
Android is a very attractive platform for malware developers because it is widely used. There is a need to understand how malware works and how it can exploit a system´s security architecture. To do so, this work decompiles Android malware applications to study their source code and to look for patterns, regarding instructions, method calls, and permission usage. The goal is to define a set of instruction-based signatures that identify dangerous behavior and to use the identified signatures as a base for developing tools for code analysis.
Keywords
Android (operating system); invasive software; smart phones; source code (software); Android malware instruction identification; code analysis; dangerous behavior; instruction-based signatures; malware developers; source code; system security architecture; Androids; Humanoid robots; Java; Malware; Receivers; Smart phones; permission management; smartphone security;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications (LATINCOM), 2014 IEEE Latin-America Conference on
Conference_Location
Cartagena de Indias
Print_ISBN
978-1-4799-6737-7
Type
conf
DOI
10.1109/LATINCOM.2014.7041862
Filename
7041862
Link To Document