• DocumentCode
    118676
  • Title

    Identifying Android malware instructions

  • Author

    Morales Medina, Laura Victoria ; Rueda, Sandra Julieta

  • Author_Institution
    Syst. & Comput. Eng. Dept., Univ. de los Andes, Andes, Colombia
  • fYear
    2014
  • fDate
    5-7 Nov. 2014
  • Firstpage
    1
  • Lastpage
    7
  • Abstract
    Android is a very attractive platform for malware developers because it is widely used. There is a need to understand how malware works and how it can exploit a system´s security architecture. To do so, this work decompiles Android malware applications to study their source code and to look for patterns, regarding instructions, method calls, and permission usage. The goal is to define a set of instruction-based signatures that identify dangerous behavior and to use the identified signatures as a base for developing tools for code analysis.
  • Keywords
    Android (operating system); invasive software; smart phones; source code (software); Android malware instruction identification; code analysis; dangerous behavior; instruction-based signatures; malware developers; source code; system security architecture; Androids; Humanoid robots; Java; Malware; Receivers; Smart phones; permission management; smartphone security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications (LATINCOM), 2014 IEEE Latin-America Conference on
  • Conference_Location
    Cartagena de Indias
  • Print_ISBN
    978-1-4799-6737-7
  • Type

    conf

  • DOI
    10.1109/LATINCOM.2014.7041862
  • Filename
    7041862