2018
DOI: 10.1155/2018/6280768
|View full text |Cite
|
Sign up to set email alerts
|

Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework

Abstract: Unity is the most popular cross-platform development framework to develop games for multiple platforms such as Android, iOS, and Windows Mobile. While Unity developers can easily develop mobile apps for multiple platforms, adversaries can also easily build malicious apps based on the "write once, run anywhere" (WORA) feature. Even though malicious apps were discovered among Android apps written with Unity framework (Unity apps), little research has been done on analysing the malicious apps. We propose static a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…Another issue in classifying Android malware families is to handle the malicious apps written with cross-platform mobile app development tools such as Unity, Cocos2D, PhoneGap, etc [59], [60]. In these cases, malicious code may be located in the javascript(js) file, or asset or lib folders of an APK, as opposed to the DEX file.…”
Section: Discussionmentioning
confidence: 99%
“…Another issue in classifying Android malware families is to handle the malicious apps written with cross-platform mobile app development tools such as Unity, Cocos2D, PhoneGap, etc [59], [60]. In these cases, malicious code may be located in the javascript(js) file, or asset or lib folders of an APK, as opposed to the DEX file.…”
Section: Discussionmentioning
confidence: 99%
“…Since most VR apps have been developed based on Unity to render 3D environment, achieve immersive user experience, and collect biometric data, we also review related work as follows. Shim et al [47] proposed a reverse engineering method with a combination of static and dynamic analysis to analyze malicious Unity apps. This tool can be used to analyze the native code of Java, C, C++, and the Mono layer where the C# code runs.…”
Section: Related Workmentioning
confidence: 99%
“…The detection and analysis model of malicious code consists of two pieces: feature extraction and classification. The current feature extraction method is usually divided into serval types: static analysis [5], [6], dynamic analysis [7], [8], dynamic and static fused analysis [9]- [11], the graphs-based approach [12]- [14] et.…”
Section: Related Workmentioning
confidence: 99%