Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/574324
Title: | An Approach to detection of privacy leakage Vulnerability in Android mobile Applications |
Researcher: | Rathod, Jigna Prabhatsinh |
Guide(s): | Bhatti, Dharmendra |
Keywords: | Android Security Computer Science Malware detaction |
University: | Uka Tarsadia University |
Completed Date: | 2024 |
Abstract: | Malware is malicious programs that intentionally carry out destructive actions. it is categorized as software that can harm any computer, mobile device, or operating system. Over the past decade, an increasing number of malwares has been created. The exponential growth and complexity of malware pose a serious threat to computer and network security. In recent times, cybercriminals (attackers) have used malware as a weapon to carry out attacks on computer systems to fulfill their nefarious intentions. Malware is classified into several types based on its behavior and execution nature, such as worms, viruses, Trojans, rootkits, backdoors, spyware, logic bombs, adware, and ransomware. The Internet is the primary medium for carrying out malware attacks on computer systems through emails, malicious websites, and attached software code. Computer systems are compromised for many reasons such as: for financial gain, stealing confidential or private data, using the system to act as a bot, or making services unavailable to the system, etc. Therefore, detecting vulnerability is essential for recognizing and offering early warnings of potential attacks. Android operating system is particularly vulnerable to malware attacks due to its open-source nature. newlineZeus GameOver, Blackrock, Cerberus, StrandHogg, and AgentSmith are the current malware attacks active in 2019-2022. The usual approaches used for detecting Android vulnerabilities are ineffective due to the variety and many Flavors of Android malware families. Vulnerability detection heavily utilizes the field of machine learning, which can be used to overcome the shortcomings of conventional procedures. Vulnerability detectors are evaluated using machine learning on a small dataset with a limited variety of malicious files. newlineTo develop a system that detects a vulnerability, malicious samples are analyzed using techniques called static and dynamic analysis. Static analysis methods retrieve the characteristics of malware without running the malicious file. |
Pagination: | 202p |
URI: | http://hdl.handle.net/10603/574324 |
Appears in Departments: | Faculty of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 163.17 kB | Adobe PDF | View/Open |
02_preliminary pages.pdf | 2.34 MB | Adobe PDF | View/Open | |
03_content.pdf | 158.22 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 148.12 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 349 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 440.79 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 796.3 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 1.38 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 514.84 kB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 173.7 kB | Adobe PDF | View/Open | |
11_annexure.pdf | 2.26 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 326.84 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: