2018
DOI: 10.30880/ijie.2018.10.06.029
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the Root of Attack in Android Malware

Abstract: With the rapid pace of development and change in mobile device technology and Android versions, Android malware has emerged and become a focus in current research. Subsequently, security and privacy have become one of the main issues in android malware. Therefore, it is essential to understand the behavior of Android malware in order to conceive an effective technique in malware detection and analysis. This article presents a comprehensive study regarding Android platform, its features in android malware code … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…School closures have impact in the change of learning system from initially face-to-face become online learning. Online learning is media set in many formats such as text, picture, and video, that can be accessed by internet (Romli, 2018). From the definition, online learning can be interpreted as a learning system that arrange a meeting between student and instructor via media that is connected to the internet.…”
Section: Introductionmentioning
confidence: 99%
“…School closures have impact in the change of learning system from initially face-to-face become online learning. Online learning is media set in many formats such as text, picture, and video, that can be accessed by internet (Romli, 2018). From the definition, online learning can be interpreted as a learning system that arrange a meeting between student and instructor via media that is connected to the internet.…”
Section: Introductionmentioning
confidence: 99%
“…After all the information about the network API is obtained, an analysis of network traffic is recorded while running malware in a virtual environment using Wireshark. Analysis carried out on the results of capturing network traffic is to look at the behavior of malware on network traffic, the payload carried by malware, and the measurement of traffic between normal traffic and malicious traffic that has been infected with malware [22].…”
Section: Introductionmentioning
confidence: 99%