DSpace Repository

A Large-Scale Investigation to Identify the Pattern of App Component in Obfuscated Android Malwares

Show simple item record

dc.contributor.author Russel, Md. Omar Faruque Khan
dc.contributor.author Motiur Rahman, Sheikh Shah Mohammad
dc.contributor.author Islam, Takia
dc.date.accessioned 2021-11-29T05:50:17Z
dc.date.available 2021-11-29T05:50:17Z
dc.date.issued 2020-06-15
dc.identifier.uri http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/6500
dc.description.abstract Number of smartphone users of android based devices is growing rapidly. Because of the popularity of the android market malware attackers are focusing in this area for their bad intentions. Therefore, android malware detection has become a demanding and rising area to research in information security. Researchers now can effortlessly detect the android malware whose patterns have formerly been recognized. At present, malware attackers commenced to use obfuscation techniques to make the malwares incomprehensible to malware detectors. For this motive, it is urgent to identify the pattern that is used by attackers to obfuscate the malwares. A large-scale investigation has been performed in this paper by developing python scripts to extract the pattern of app components from an obfuscated android malware dataset. Ultimately, the patterns in a matrix form has been established and stored in a Comma Separated Values (CSV) file which will conduct to the primary basis of detecting the obfuscated malwares. en_US
dc.language.iso en_US en_US
dc.publisher Springer en_US
dc.subject Android malware en_US
dc.subject Obfuscated malware en_US
dc.subject App component pattern en_US
dc.subject Pattern identification en_US
dc.title A Large-Scale Investigation to Identify the Pattern of App Component in Obfuscated Android Malwares en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account

Statistics