blog




  • Essay / Android Malware Infection Analysis: Android Malware Infection Analysis

    1Android Malware Infection AnalysisThis topic covers an inexpensive method of analyzing the infection rate in an Android mobile. This method can also be used as a malware risk indicator.PRAVEEN KUMARMNIT Jaipur2010UCP2062ABSTARTCThe popularity and use of smart phone in daily life is increasing exponentially. Today we depend on our phone a lot and even store very important data on our phone. It therefore becomes very important to address the challenge posed by malware or notoriously called malware. But to prevent our phone and develop malware detection software, it is very important to understand the behavior of these malware. Keeping this in mind, this article aims to understand what malware is and its distribution in Android smart phone because Android phone covers a large proportion of smart phones built today. This article also discusses a study done by the University of Berkley on the rate of malware infection and a popular application "Carat" used for the study. Next, we list the algorithm used and our implementation of the algorithm. We also offer an application developed for this purpose.3INDEX Page No1. INTRODUCTION 42. BASIC KNOWLEDGE 63. DATA SET 94. CALCULATION OF INFECTION RATE 105. ANALYSIS OF INFECTION RATE 116. DIFFERENCE IN TWO ANALYSIS MECHANISM 127. PROPOSED APPLICATION 138. FUTURE SCOPE 149. CONCLUSION 15 ENCES 1641 INTRODUCTIONToday, Android is the most used operating system. So there is hearsay that draws attention to popularity. Thus, the growing popularity of Android has also attracted the attention of hackers and miscreants. As a result, a large number of malicious applications are developed and distributed every day. But before we go further, let's quickly understand malware and how it is different from bug apps. Why and...... middle of paper ...... transfer of malicious application from one user to another.16References:- 1) The Company You Keep: Malware Infection Rate mobile and inexpensive risk indicators by the University of Berkley2) A survey of mobile malware in the wild by Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steven Hanna, and David Wagner, University of California, Berkeley3) Dissection of Android Malware: Characterization and Evolution by Yajin Zhou, Xuxian Jiang, North Carolina State University4) Genome Malware Project - http://www.malgenomeproject.org/5) Google Developer - http://developer.android. com/- App Signing http://developer.android.com/tools/publishing/appsigning.html#signing 6) Lookout Malware Prediction - https://blog.lookout.com/blog/2012/12 /13/2013-mobile-threat-predictions/7) Update from Google CEO Larry Page - http://googleblog.blogspot.fi/2013/03/update-fromceo.html