dc.contributor.author |
Burke, Ivan D
|
|
dc.contributor.author |
Pieterse, Heloise
|
|
dc.date.accessioned |
2015-11-12T07:39:50Z |
|
dc.date.available |
2015-11-12T07:39:50Z |
|
dc.date.issued |
2015-03 |
|
dc.identifier.citation |
Burke, I and Pieterse, H. 2015. How to tame your android malware. In: 10th International Conference on Cyber Warfare and Security, Kruger National Park, South Africa, 24-25 March 2015, pp 54-65. |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10204/8266
|
|
dc.identifier.uri |
https://www.academia.edu/29265003/How_to_Tame_Your_Android_Malware
|
|
dc.identifier.uri |
https://www.researchgate.net/publication/274255324_How_to_Tame_Your_Android_Malware
|
|
dc.description |
Abstract Only. |
en_US |
dc.description.abstract |
The Android mobile market has expanded greatly in recent years, but with its increased market share Android became a popular target for malware developers. The latest Anti-Virus reports suggest that Android account for the majority of malware detected on mobile devices. This is largely due to the open nature of Android development and the level of system utilities Android software developers are given access to. This paper reviews the currently available open source solutions available, for analysing mobile malware. In this paper the authors, provide an overview of the anatomy of an Android applications. Several malware analysis tools and reverse engineering tools have been developed to analyse and deconstruct APK files. The paper presents a method by which common open source tools can be used to dissect the APK file to uncover its intent. To conclude the authors identify the current shortcomings, with regards to currently available open source software, when it comes to the classification of malicious Android applications. |
en_US |
dc.language.iso |
en |
en_US |
dc.relation.ispartofseries |
Worklist;15832 |
|
dc.subject |
Mobile infection vectors |
en_US |
dc.subject |
Malware developers |
en_US |
dc.subject |
Malware analysis tools |
en_US |
dc.subject |
Android mobiles |
en_US |
dc.subject |
Reverse engineering |
en_US |
dc.subject |
Open source tools |
en_US |
dc.title |
How to tame your android malware |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Burke, I. D., & Pieterse, H. (2015). How to tame your android malware. http://hdl.handle.net/10204/8266 |
en_ZA |
dc.identifier.chicagocitation |
Burke, Ivan D, and Heloise Pieterse. "How to tame your android malware." (2015): http://hdl.handle.net/10204/8266 |
en_ZA |
dc.identifier.vancouvercitation |
Burke ID, Pieterse H, How to tame your android malware; 2015. http://hdl.handle.net/10204/8266 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Burke, Ivan D
AU - Pieterse, Heloise
AB - The Android mobile market has expanded greatly in recent years, but with its increased market share Android became a popular target for malware developers. The latest Anti-Virus reports suggest that Android account for the majority of malware detected on mobile devices. This is largely due to the open nature of Android development and the level of system utilities Android software developers are given access to. This paper reviews the currently available open source solutions available, for analysing mobile malware. In this paper the authors, provide an overview of the anatomy of an Android applications. Several malware analysis tools and reverse engineering tools have been developed to analyse and deconstruct APK files. The paper presents a method by which common open source tools can be used to dissect the APK file to uncover its intent. To conclude the authors identify the current shortcomings, with regards to currently available open source software, when it comes to the classification of malicious Android applications.
DA - 2015-03
DB - ResearchSpace
DP - CSIR
KW - Mobile infection vectors
KW - Malware developers
KW - Malware analysis tools
KW - Android mobiles
KW - Reverse engineering
KW - Open source tools
LK - https://researchspace.csir.co.za
PY - 2015
T1 - How to tame your android malware
TI - How to tame your android malware
UR - http://hdl.handle.net/10204/8266
ER -
|
en_ZA |