DSpace Repository

AndroShow : Pattern Identification of Obfuscated Android Malware Application

Show simple item record

dc.contributor.author Russel, Md. Omar Faruque Khan
dc.date.accessioned 2020-01-06T11:19:24Z
dc.date.available 2020-01-06T11:19:24Z
dc.date.issued 2019-05-05
dc.identifier.uri http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/3557
dc.description.abstract Android smartphone’s security and privacy of personal information remain threatened because of popularity. Noxious applications represent a danger to the security of the Android. Yet understanding Android malware utilizing dynamic examination can give a far-reaching view, it is still exposed to surprising expense in condition arrangement and manual endeavors in examination. To classify or detect android malware applications, it is important to identify pattern of malware. In this study, some important static features pattern of obfuscated android malware applications has been proposed. AndroShow, a broad static analysis-based feature analyzer is introduced that identifies important features pattern of Android. Permission, API call, app component, intent filter and system call patterns are embedded in vector matrix. In order to classification and detection of android malware application this malware pattern analysis will beneficial. AndroShow investigate 10479 obfuscated malware applications. These malware applications consist of seven categories of obfuscation techniques taken from PRAGuard dataset. en_US
dc.language.iso en_US en_US
dc.publisher Daffodil International University en_US
dc.subject Malevolent software en_US
dc.subject Mobile technology en_US
dc.title AndroShow : Pattern Identification of Obfuscated Android Malware Application en_US
dc.type Other en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account