1
Android Malware Infection Analysis
This topic covers the a inexpensive method of analyzing infection rate in android mobile. This method can also be used as malware risk indicator.
PRAVEEN KUMAR
MNIT Jaipur
2010UCP206
2
ABSTARCT
The popularity and use of smart phone in daily life is increasing exponentially. So today we depend much on our phone and even store very important data on our phone. So it becomes very important to cope up with challenge posed due to malicious software or notoriously known as malware. But to prevent our phone and develop malware detecting software it is very important to understand the behavior of these malware .Keeping that in mind this paper aims to have a understanding of –what is malware and its distribution in android smart phone as android phone covers a large proportion of smart phone built today. This paper also discusses a study carried by Berkley University for malware infection rate and a popular app “Carat” used for study. Then we list the algorithm used and our implementation of algorithm. We also propose an app developed for the specific purpose.
3
INDEX Page No
1. INTRODUCTION 4
2. BACKGROUND KNOWLEDGE 6
3. DATASET 9
4. INFECTION RATE CALCULATION 10
5. INFECTION RATE ANALYSIS 11
6. DIFFERNCE IN TWO ANALYSIS MECHANISM 12
7. PROPOSED APP 13
8. FUTURE SCOPE 14
9. CONCLUSION 15
REFERENCES 16
4
1. INTRODUCTION
Today android is most used operating system. So there is a hearsay popularity draws attention. So increasing popularity of android has drawn attention of hacker and miscreant as well .As a result a large no of malware app are developed and distributed every day. But before proceeding further let’s have a quick understanding of malware and how it is different from bug application.
Why and...
... middle of paper ...
... transfer of malicious app from one user to another.
16
References:-
1) The$Company$You$Keep: $Mobile$Malware$Infection$Rate$and$Inexpensive Risk Indicators by Berkley university
2) A Survey of Mobile Malware in the Wild by Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steven Hanna, and David Wagner, University of California, Berkeley
3) Dissecting Android Malware: Characterization and Evolution by Yajin Zhou, Xuxian Jiang, North Carolina State University
4) Genome Malware project
- http://www.malgenomeproject.org/
5) Google developer
- http://developer.android.com/
- Signing of application http://developer.android.com/tools/publishing/appsigning.html#signing 6) Lookout malware prediction
- https://blog.lookout.com/blog/2012/12/13/2013-mobile-threat-predictions/
7) Update from the Google CEO Larry Page
- http://googleblog.blogspot.fi/2013/03/update-fromceo.html
At the Aim Higher College there have been recently discovered malware on the campus systems that are due to many recent attacks. I used an Anti-virus protection software called AVG on the computer systems on campus and ran a whole computer scan. The results came back very quick of numbers of malware being high and medium priorities that these should not be taken lightly. Furthermore, the scan found many viruses, Trojans, and malicious software and applications.
ZHENGCHUAN, XU, HU QING, and ZHANG CHENGHONG. "Why Computer Talents Become Computer Hackers." Communications Of The ACM 56.4 (2013): 64-74. Academic Search Premier. Web. 28 Apr. 2014.
The evolution of cyber threats has reached a critical point where hackers withhold important information in exchange for payment. In the last three decades, the Internet has fundamentally changed the way people, governments, and private organizations store, use, and manage information. The age of the Internet of Things has left everyone at the risk of a ransomware attack (Richardson and North 13). The ubiquitous connection to the Internet through mobile devices such as tablets, smartphones, and laptops has made the Internet the obvious and convenient place to store personal data including photos, research information, and business records. The challenge is that cybercriminals have developed a new way of getting illegitimate
Data Reverse Engineering on smartphone can have postivie and negative effect. Many of the applications today were created because of Data Reverse Engineering. a postive effect is that application developer can use Data Reverse Engineering to create a similar or new app from an existing app. A negative effect would be the creation of an application that is used to retrieve certain data from an individual or application attack other devices. An application may also be created to support criminal investigation and other forensic related subjects. There are numerous amount forensic tools application for all type of devices. Overall, an application that is created to attack other devices is not always bad, it just depence on the who is using the application.
Having first appeared in Russia in 2005, referred as Winlock, that successfully scammed over £10m from unsuspecting victims before the Russian authorities arrested 10 individuals for involvement in such hackings in 2010, however it hasn’t stop the growing number of the problem. With such profitable money to obtain, perpetrators have discovered new ways to spread the malware and to cash-in at the expense of victims.
Malware, or malicious malware has a significant impact in our society. Sophisticated malware, are on the rise against users, utility software and user applications especially for monetary profits. Some of the threats are stealing sensitive information like credit card numbers or copyrighted materials, spamming, impersonating and extorting money (ransomware). It is a cybercrime operated by crackers. Indeed, crackers are individuals who break into computers and networks for criminal purposes. Consequently, cyber security is a major concern of computing systems.
Computers are main technological features that allow criminals to step into unsuspecting victims lives. With a simple piggy-backing program hackers are able to track every keystroke made by the victim. One such program is called spyware, not to be confused with adware, which is often referred to interchangeably with spyware, but is potentially harmless (Louis 15). Spyware, hidden within downloaded software, implants itself deep within a computer’s hard drive, allowing it to track every move made by the user (Louis 16).
Mobile devices are being exposed to a record number of security threats with potentially alarming statistics indicating a 400 percent increase in Android malware for example, while Wi-Fi connections are also being increasingly targeted. While the conventional desktop PC will still continue to serve important functions at both consumer and professional levels, there is an expectation that mobile devices will become the predominant form for accessing both personal and professional content it is understandable that cyber criminals have begun focusing on mobile devices which have at the same time grown their user base while substantially consolidating the operating system variants which makes the surface area for a potential attack substantially larger (...
When searching for the latest device you have a choice between apple, and android. These two are similar but very different. Infact these both have two different operating systems. For instance Apple uses IOS 9, apple phones can use this software. On android the software 5.0 is used. All these phones run different programs, you need to make sure that is the right phone for you. There are many different features and styles of phones you can get. Also these all come at a price. This paper will talk about all these topics to make sure you have an idea on what device you would like to buy.
Huggestuen, John, 2013, December 15th.. Smartphone and Tablet Penetration. The Business Insider. Available at: [Accessed Mar 25th, 2014]
In today’s days malware is designated as a software which aims to disturb a computer with the consent or permission of the owner. This term “Malware” is used by computer professionals to describe a varied forms of destructive, annoying and intrusive software code. This word “Malware” is used to indicate all types of malware which include a true set of viruses.
“ Prevention is better than cure ”, if computer users are aware of Malware attacks, they may prevent those attacks . So, in this research paper i am going to focus on Malware and Protecting Against Malware.
Malicious code, also known as malware, installed on a computer provides an attacker with the control over this machine. Therefore, malware can be defined as “a set of instructions that run on your computer and make your system do something that an attacker wants to do”. It is more common to see malicious code to be implemented in binary executable files. However, it can be implemented in almost any computer language. Attackers have used a huge number of scripting languages, word processing macro languages and a h...
In this audit we have compared two operating system windows and android. android phones are more efficient then windows as it is an open source platform though it is unsecured , one can easilly modifiy the code.
Mobile application is a very aggressive market, there are hundreds of platforms to choose from when designing applications. There are several platforms that currently dominate over other platforms. The Android platform is very popular, it’s one of the most preferred platforms for building applications. Most of its applications are built using JAVA software, but there are others software that are just as equal or greater. Java software is free and offer a free software development kit. The kit consists of sample applications, source codes, developer tools, and emulators...