Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/574324
Title: An Approach to detection of privacy leakage Vulnerability in Android mobile Applications
Researcher: Rathod, Jigna Prabhatsinh
Guide(s): Bhatti, Dharmendra
Keywords: Android Security
Computer Science
Malware detaction
University: Uka Tarsadia University
Completed Date: 2024
Abstract: Malware is malicious programs that intentionally carry out destructive actions. it is categorized as software that can harm any computer, mobile device, or operating system. Over the past decade, an increasing number of malwares has been created. The exponential growth and complexity of malware pose a serious threat to computer and network security. In recent times, cybercriminals (attackers) have used malware as a weapon to carry out attacks on computer systems to fulfill their nefarious intentions. Malware is classified into several types based on its behavior and execution nature, such as worms, viruses, Trojans, rootkits, backdoors, spyware, logic bombs, adware, and ransomware. The Internet is the primary medium for carrying out malware attacks on computer systems through emails, malicious websites, and attached software code. Computer systems are compromised for many reasons such as: for financial gain, stealing confidential or private data, using the system to act as a bot, or making services unavailable to the system, etc. Therefore, detecting vulnerability is essential for recognizing and offering early warnings of potential attacks. Android operating system is particularly vulnerable to malware attacks due to its open-source nature. newlineZeus GameOver, Blackrock, Cerberus, StrandHogg, and AgentSmith are the current malware attacks active in 2019-2022. The usual approaches used for detecting Android vulnerabilities are ineffective due to the variety and many Flavors of Android malware families. Vulnerability detection heavily utilizes the field of machine learning, which can be used to overcome the shortcomings of conventional procedures. Vulnerability detectors are evaluated using machine learning on a small dataset with a limited variety of malicious files. newlineTo develop a system that detects a vulnerability, malicious samples are analyzed using techniques called static and dynamic analysis. Static analysis methods retrieve the characteristics of malware without running the malicious file.
Pagination: 202p
URI: http://hdl.handle.net/10603/574324
Appears in Departments:Faculty of Computer Science

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File163.17 kBAdobe PDFView/Open
02_preliminary pages.pdf2.34 MBAdobe PDFView/Open
03_content.pdf158.22 kBAdobe PDFView/Open
04_abstract.pdf148.12 kBAdobe PDFView/Open
05_chapter 1.pdf349 kBAdobe PDFView/Open
06_chapter 2.pdf440.79 kBAdobe PDFView/Open
07_chapter 3.pdf796.3 kBAdobe PDFView/Open
08_chapter 4.pdf1.38 MBAdobe PDFView/Open
09_chapter 5.pdf514.84 kBAdobe PDFView/Open
10_chapter 6.pdf173.7 kBAdobe PDFView/Open
11_annexure.pdf2.26 MBAdobe PDFView/Open
80_recommendation.pdf326.84 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: