Show simple item record

dc.contributor.author Russel, Md. Omar Faruque Khan
dc.contributor.author Rahman, Sheikh Shah Mohammad Motiur
dc.contributor.author Alazab, Mamoun
dc.date.accessioned 2022-05-07T06:12:18Z
dc.date.available 2022-05-07T06:12:18Z
dc.date.issued 2021
dc.identifier.uri http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/7955
dc.description.abstract This paper represents a static analysis based research of android’s feature in obfuscated android malware. Android smartphone’s security and privacy of personal information remain threatened because of android based device popularity. It has become a challenging and diverse area to research in information security. Though malware researchers can detect already identified malware, they cannot detect many obfuscated malware. Because, malware attackers use different obfuscation techniques, as a result many anti malware engines cannot detect obfuscated malware applications. Therefore, it is necessary to identify the obfuscated malware pattern made by attackers. A large-scale investigation has been performed in this paper by developing python scripts, named it AndroShow, to extract pattern of permission, app component, filtered intent, API call and system call from an obfuscated malware dataset named Android PRAGuard Dataset. Finally, the patterns in a matrix form have been found and stored in a Comma Separated Values (CSV) file which will be the base of detecting the obfuscated malware in future. en_US
dc.language.iso en_US en_US
dc.publisher Scopus en_US
dc.subject Android malware en_US
dc.subject Obfuscated malware en_US
dc.subject Obfuscated malware pattern en_US
dc.subject Obfuscated malware pattern identification en_US
dc.title AndroShow en_US
dc.title.alternative A Large Scale Investigation to Identify the Pattern of Obfuscated Android Malware en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account

Statistics