Malware Detection in Android Smartphones: A Dynamic Analysis Framework
Android-based smartphones have become a prime target for malware writers due to their widespread use, with numerous malicious applications available on play stores, posing a significant threat to users' personal and business data. Traditional signature-based malware detection schemes are ineffective against new and sophisticated malware, while generic solutions based on static analysis schemes become less effective against obfuscated malware.
To address this challenge, they say VolMemDroid, a dynamic analysis-based framework for detecting malicious Android applications. Our framework extracts volatile memory artifacts for profiling malicious applications using the memory forensic framework of Volatility. They analyze various Volatility plugins for their compatibility with the Android platform and their ability to model application behavior. After testing, chosen plugins are processed for feature extraction, resulting in a comprehensive feature set for Android malware detection and categorization.
Key Findings:
- Effective Detection: VolMemDroid achieves an F1-score of 0.972, outperforming existing volatile memory-based approaches for Android malware detection.
- Accurate Categorization: Our framework effectively categorizes malicious Android applications into four distinct classes.
Conclusion:
VolMemDroid offers a robust and dynamic analysis-based framework for detecting and categorizing malicious Android applications, addressing the limitations of traditional signature-based schemes and static analysis approaches. They claim the framework provides a comprehensive feature set for Android malware detection and categorization, ensuring enhanced protection for users' personal and business data.
VolMemDroid—Investigating android malware insights with volatile memory artifacts
S Khalid, FB Hussain - Expert Systems with Applications, 2024
… malware detection are unable to handle new and sophisticated malware.
Furthermore, generic solutions based on static analysis schemes become less
effective in the presence of obfuscated malware… four malware classes are …
Furthermore, generic solutions based on static analysis schemes become less
effective in the presence of obfuscated malware… four malware classes are …
[PDF] An examination of the concept of cybercrimes under Indian criminal law with particular reference to the Information Technology Act of 2000
M Jiyauddin, S Banerjee
… They also pose a threat to national security through actions such as hacking into
vital defence institution websites and banks. Cybercriminals must be investigated
and prosecuted using a capable legal system and a deterrent strategy. Cybercrime …
vital defence institution websites and banks. Cybercriminals must be investigated
and prosecuted using a capable legal system and a deterrent strategy. Cybercrime …
PDF] The Role of Ethical Hacking in Modern Cybersecurity Practices
A Rayhan
… Through a comprehensive analysis, this paper aims to highlight the
indispensable role of ethical hacking in contemporary cybersecurity … Outcome:
The bank addressed the identified issues and enhanced its security protocols. The …
indispensable role of ethical hacking in contemporary cybersecurity … Outcome:
The bank addressed the identified issues and enhanced its security protocols. The …
[PDF] Authentication and Access using the Multi-Layer Information Security (MLIS) Technology for E-Commerce Applications
JR Jayapandiyan
… In this year alone, hacking had increased by 37%. Recently, a case of related
hacking with specialized web interfaces and obtaining … They next input the new
PIN into the GUI of the online bank, which sends it to the security server of the bank …
hacking with specialized web interfaces and obtaining … They next input the new
PIN into the GUI of the online bank, which sends it to the security server of the bank …
\
No comments:
Post a Comment