2022
DOI: 10.17762/ijcnis.v12i3.4732
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Malware Behaviour through Opcode Analysis

Abstract: As the popularity of mobile devices are on the rise, millions of users are now exposed to mobile malware threats. Malware is known for its ability in causing damage to mobile devices. Attackers often use it as a way to use the resources available and for other cybercriminal benefits such stealing users’ data, credentials and credit card number. Various detection techniques have been introduced in mitigating mobile malware, yet the malware author has its own method to overcome the detection method. This paper p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…An alternative audit source data to overcome this drawback is through dynamic analysis. [25], [26], [27], [28] and [29] are the researchers that used dynamic audit data source features such as Network traffic traces, systems call, user interaction behaviors and opcode. This type of audit data source can evade the code obfuscation and encryption as the mobile application activity traces are captured during the runtime of the application.…”
Section: Related Workmentioning
confidence: 99%
“…An alternative audit source data to overcome this drawback is through dynamic analysis. [25], [26], [27], [28] and [29] are the researchers that used dynamic audit data source features such as Network traffic traces, systems call, user interaction behaviors and opcode. This type of audit data source can evade the code obfuscation and encryption as the mobile application activity traces are captured during the runtime of the application.…”
Section: Related Workmentioning
confidence: 99%