“…If Total Weightage is greater than threshold value then application is declared as malicious application. Total Weightage (Total Weightage ) is calculated as (1) For analysis, different applications are taken from android market and some new applications are also developed in which malicious code is introduced. In this paper, testing of different applications is done by considering various factors like Application which behaves normal Application which show malicious samples by testing with Avira and McAfee Application in which malicious code is embedded Application which is malicious but not detected by antivirus scanner It has been observed that all malicious applications are declared as malicious by our hybrid approach.…”
Section: Methodsmentioning
confidence: 99%
“…But, an Android phone surpasses iPhone due to its Open Source Operating system, highest market share, and unrestricted application market for third party applications. Due to the advancement in functionalities of Android OS, it has been deployed by many companies like Samsung, LG, Google, Motorola and Dell 1,2 .…”
Among all available Mobile OS, Android is an ideal target for attackers due to its huge popularity. Android provides open-source OS and also provides ability to install third party applications that poses threat of user's privacy breach. In this paper, we have a close look at permissions that are granted during installation period. We have proposed a hybrid approach for detection of malicious applications by scanning with different antivirus softwares and comparing all. This hybrid approach depends upon three parameters-Description Mapping, Interface Analysis and Source Code Analysis that defines an application's behaviour i.e. either it behaves malicious or normal.
“…If Total Weightage is greater than threshold value then application is declared as malicious application. Total Weightage (Total Weightage ) is calculated as (1) For analysis, different applications are taken from android market and some new applications are also developed in which malicious code is introduced. In this paper, testing of different applications is done by considering various factors like Application which behaves normal Application which show malicious samples by testing with Avira and McAfee Application in which malicious code is embedded Application which is malicious but not detected by antivirus scanner It has been observed that all malicious applications are declared as malicious by our hybrid approach.…”
Section: Methodsmentioning
confidence: 99%
“…But, an Android phone surpasses iPhone due to its Open Source Operating system, highest market share, and unrestricted application market for third party applications. Due to the advancement in functionalities of Android OS, it has been deployed by many companies like Samsung, LG, Google, Motorola and Dell 1,2 .…”
Among all available Mobile OS, Android is an ideal target for attackers due to its huge popularity. Android provides open-source OS and also provides ability to install third party applications that poses threat of user's privacy breach. In this paper, we have a close look at permissions that are granted during installation period. We have proposed a hybrid approach for detection of malicious applications by scanning with different antivirus softwares and comparing all. This hybrid approach depends upon three parameters-Description Mapping, Interface Analysis and Source Code Analysis that defines an application's behaviour i.e. either it behaves malicious or normal.
Currently, the use of mobile terminals is becoming a necessity for a high number of people around the world which has driven the development of devices with Android operating system; In addition to this, the same indiscriminate access to resources of internet and weak local and international regulations on the use, they have become vulnerable to attacks on the network - injection of malware, ransomware-, among many others. Therefore, this article reviews the hacking tools for the forensic investigation of mobile terminals, proposing from the documentary research a forensic information acquisition model to determine tangible and significant evidences as a probative material.
“…Activity is a visible process which works in the foreground of the mobile screen and interacting with the user with the help of user interfaces [7,20].…”
Section: Activitymentioning
confidence: 99%
“…Hackers become more attractive towards smart phones than PC, and particularly the Google's Android OS. An Android is an open source 1 OS (operating system) developed by the Open Handset Alliance and held by Google Inc [20]. Android becomes more popular because Google Play alone had 500,000 applications that are classified as free or paid, in May 2012.…”
Smart phones, which were once a luxury product has now become a household product. This transformation has been due to the vast amount of functionalities which a smart phone provides in just a single device. Smartphone OS, such as Android, is an Open Source mobile platform that enables us to install third party applications. Due to large amount of applications that are available on the app store, it becomes very difficult for a user to distinguish between a malware free and malware containing application. In this paper, we are proposing a hybrid approach for detection of spyware genre applications out of all the installed applications.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.