Android Malware: Study and analysis of malware for privacy leak in ad-hoc network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 12, Issue 3
Abstract
Smartphone’s users has been increasing since last few years which provides numerous operations like accessing information through online mode, payment options, using utility applications, playing games. Smartphone’s have become so powerful these days that tends to play the role of PC’s. The basic operation of any mobile phone calling, storing personal details like contact information in contact book, business data, text messages etc. Since we are in new generation, where so many different varieties of devices connect together with each other giving way for security concerns. With the huge and tremendous uprising Smartphone sales in market, the chances of malicious attacks became a trouble. As malware developers tries to steal information from such devices. This paper provides a study of analyzing malware through static and dynamic means. In static analysis we are performing reverse engineering to detect malicious code and in dynamic analysis we are using tools to identify the packet structure. Further we perform white listing for safe destination address. In this paper we are highlighting the aspects of mobile malware when compared with third party applications like Lookout etc
Authors and Affiliations
Akash Malhotra
Self Appreciating Concept Based Model For Cross Domain Document Classification
Abstract : In text mining, text categorization is an important technique for classifying the documents. Most of the times statistical approaches that are based on analysis of the term in the form of frequency of th...
Passive Image Forensic Method to detect Copy Move Forgery in Digital Images
Abstract: Tampering in digital images has become very easy due to the availability of advanced image editing softwares to the users. Images are being tampered in a very efficient manner without leaving any visual c...
Privacy Preserving and Load Balancing For Secure Cloud Storage
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data sto...
A Survey of the Internet of Things
Abstract: This paper studies the state-of-art of Internet of Things (IoT). By enabling new forms of communication between people and things, and between things themselves, IoT would add a new dimension to the world of in...
Spam Detection using Natural Language Processing
Abstract: Spam mails can be referred as unsolicited bulk email. These messages are used to advertise products and services for phishing purposes or to lead recipients to malicious sites with unethical intentions. A...