首页> 外文期刊>International journal of electronic security and digital forensics >Reversing and auditing of android malicious applications using sandboxing environment
【24h】

Reversing and auditing of android malicious applications using sandboxing environment

机译:使用沙箱环境来逆转和审计Android恶意应用程序

获取原文
获取原文并翻译 | 示例
           

摘要

The android market has gained lot of popularity in the past recent years. The operating system stack is open source, many security analysts and hacker's has the platform to perform research on digital forensics and further enhance their exploiting in finding weakness and modifying the software attack. Our goal in this paper is to perform reversing android malicious applications henceforth audit the vulnerabilities. We reverse using the tools like apktool, dex2jar and jd-gui. Static and dynamic analysis is done with the help of sandboxing environment achieving the goal of reverse engineering. We monitor the activities, services, broadcast receiver's, shared preferences, intents and content providers. Many vulnerable apps uses content provider leakage to store and query data within the phone helpful in auditing purpose. Mobile forensics is about acquisition of information about app installed in platform. In the paper, we perform attack surface and analysis malicious features inside application by exporting its features.
机译:近年来,Android市场在过去的近年来上涨了很多人气。操作系统堆栈是开源的,许多安全分析师和黑客有平台对数字取证进行研究,并进一步增强他们在寻找弱点和修改软件攻击方面的利用。我们本文的目标是执行逆转Android恶意应用,从此审核漏洞。我们使用像APKTOOL,DEX2JAR和JD-GUI等工具反转。静态和动态分析是在替代逆向工程目标的目标的帮助下完成的。我们监控活动,服务,广播接收者,共享首选项,意图和内容提供商。许多易受攻击的应用程序使用内容提供商泄露来存储和查询手机内的数据,以帮助审计目的。移动取证是关于收购安装在平台中的应用的信息。在论文中,我们通过导出其功能来执行攻击表面并分析应用程序内的恶意功能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号