T. Barsiya. International Journal of Control, Automation, Communication and Systems (IJCACS), 1 (1):
8(january january)
DOI: 10.5121/ijcacs.2016.1105
Zusammenfassung
The prevalence of the smart phones, the large market share of android and the openness of the android
market make android more sensitive platform for malware attacks. For understanding the threat to security
and privacy it is important to analyze the behavior of the malicious application. For a forensic point of
view an analyst need to understand the behavior of the application to find out the suspicious application In
this paper, we are focusing on a different type of android malware analysis techniques: static analysis,
dynamic analysis and hybrid analysis (combination of static and dynamic analysis). This paper also
presence different methods of these analyses along with their functionality and working.Comparisons of
these analyses have been done along with their advantages and disadvantages
%0 Journal Article
%1 noauthororeditor
%A Barsiya, Tarang Kumar
%D january
%J International Journal of Control, Automation, Communication and Systems (IJCACS)
%K Neuro-fuzzy control
%N 1
%P 8
%R 10.5121/ijcacs.2016.1105
%T ANDROID MALWARE ANALYSIS : A SURVEY PAPER
%U http://airccse.com/ijcacs/papers/1116ijcacs05.pdf
%V 1
%X The prevalence of the smart phones, the large market share of android and the openness of the android
market make android more sensitive platform for malware attacks. For understanding the threat to security
and privacy it is important to analyze the behavior of the malicious application. For a forensic point of
view an analyst need to understand the behavior of the application to find out the suspicious application In
this paper, we are focusing on a different type of android malware analysis techniques: static analysis,
dynamic analysis and hybrid analysis (combination of static and dynamic analysis). This paper also
presence different methods of these analyses along with their functionality and working.Comparisons of
these analyses have been done along with their advantages and disadvantages
@article{noauthororeditor,
abstract = {The prevalence of the smart phones, the large market share of android and the openness of the android
market make android more sensitive platform for malware attacks. For understanding the threat to security
and privacy it is important to analyze the behavior of the malicious application. For a forensic point of
view an analyst need to understand the behavior of the application to find out the suspicious application In
this paper, we are focusing on a different type of android malware analysis techniques: static analysis,
dynamic analysis and hybrid analysis (combination of static and dynamic analysis). This paper also
presence different methods of these analyses along with their functionality and working.Comparisons of
these analyses have been done along with their advantages and disadvantages},
added-at = {2017-11-24T11:41:03.000+0100},
author = {Barsiya, Tarang Kumar},
biburl = {https://www.bibsonomy.org/bibtex/292739f8fe8d23361ed6ba4269524cb2c/ijcacs},
doi = {10.5121/ijcacs.2016.1105},
interhash = {b2d473ecc71cf4e9a12cf72cc045b72f},
intrahash = {92739f8fe8d23361ed6ba4269524cb2c},
journal = {International Journal of Control, Automation, Communication and Systems (IJCACS)},
keywords = {Neuro-fuzzy control},
month = {january},
number = 1,
pages = 8,
timestamp = {2017-12-26T12:13:47.000+0100},
title = {ANDROID MALWARE ANALYSIS : A SURVEY PAPER },
url = {http://airccse.com/ijcacs/papers/1116ijcacs05.pdf},
volume = 1,
year = {january}
}