IJSTE

CALL FOR PAPERS : Sep 2017

Submission Last Date
25-Sep--17
Submit Manuscript Online

FOR AUTHORS

FOR REVIEWERS

ARCHIEVES

DOWNLOADS

Open Access



CopyScape
Creative Commons License

Detecting Malicious Behavior of Android Applications


Author(s):

Dewashish Upadhyay , Rajiv Gandhi College of Engineering & Research, Nagpur; Sharvari Darbhey, Rajiv Gandhi College of Engineering & Research, Nagpur; Mitalee Munghate, Rajiv Gandhi College of Engineering & Research, Nagpur; Kalyani barapatre, Rajiv Gandhi College of Engineering & Research, Nagpur; Anjali Bondre, Rajiv Gandhi College of Engineering & Research, Nagpur

Keywords:

Android, API tracing, mobile security, mobile forensics

Abstract:

Android, is an open source platform for mobile devices and covers almost 82% of all smart phone devices in the world. This makes its security issues more prominent, especially in user privacy leakage. We developed an Application for Android-based mobile devices which will check the permissions of all the applications present on the device & simultaneously trace the API calls to detect the Malicious behavior of Android application. This tool has the capability of generating log files of API calls made by an application running on a mobile device. In addition, the dynamic monitoring feature of this application will generate an action when the highly sensitive API will be called by any malicious application. The log file may be effectively utilized in analyzing app’s behavior and intentions, which will prove to be useful in several application domains. For example, this tool may be used in developing malware detection analysis based upon the API call, identifying resource usages in different app components, developing the tool for analyzing the application’s behavior, and constructing efficient mobile anti-malware tools, etc. We proposed a twostep model which combines static and dynamic analysis approaches. During the static analysis, pre-defined permission sets are used to determine whether an application has potential risks & in dynamic analysis for those suspicious applications we use reverse engineering method to embed monitoring Smali code for those highly sensitive APIs such as sending LOCATION, SMS accessing user device ID, CONTACT, etc.


Other Details:

Manuscript Id :IJSTEV2I10178
Published in :Volume : 2, Issue : 10
Publication Date: 01/05/2016
Page(s): 663-668
Download Article

IMPACT FACTOR

3.905

NEWS & UPDATES

Submit Article

Dear Authors, You can submit your article to our journal at the following link: http://www.ijste.org/Submit

Impact Factor

The Impact Factor of our Journal is 4.753 (Year - 2016)
3.905 (Year - 2015) 2.895(Year -2014)

Click Here

Submit Payment Online

Dear Authors, Now you can submit the payment receipt to our journal online at the following link: index.php?p=Payment

IC Value

ThVe IC Value of our journal is 62.78
Click Here

GLOBAL INDEXING



















Computer Science Directory. We are listed under Computer Research Institutes category

Share on Social media

Home | Privacy Policy | Terms & Conditions | Refund Policy | Feedback | Contact Us
Copyright © 2014 ijste.org All rights reserved