Advertisement

Integrated Software Platform for Mobile Malware Analysis – A Potential Vision

  • George SuciuEmail author
  • Laurentiu Bezdedeanu
  • Cristiana Istrate
  • Mari-Anais Sachian
  • Houssam Boukoulo
  • Corentin Boscher
  • Fabien Souleyreau
  • Eduard-Cristian Popovici
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 283)

Abstract

With the evolution of technology, we are witnessing the development of mobile terminals that are getting closer to a personal computer in terms of features and applications. At the same time, there is an increase in the number of mobile device users, which also leads to an increase in the use of online shopping or finance management applications. Hence, mobile terminals become a target for cyber criminals. Starting from the analysis of the current situation in the world regarding cyber security technology and solutions, we aim to build an integrating software platform for mobile malware analysis. The aim of the research is to develop a software platform that integrates the malware analysis procedures for most of the existing mobile terminals. So, the main objective of this article is to analyze the quality of cyber-protective solutions for mobile devices. We present our experiments which may bring solutions for some of the major vulnerabilities like active development of mobile malware, and hacking. Moreover, in this article we discuss the issue of security on Android, making use of security platform like Kali which permits to use different kinds of security analysis programs.

Keywords

Malware Cyber security Integrated platform Mobile malware Kali 

Notes

Acknowledgments

This work was supported by a grant of the Ministry of Innovation and Research, UEFISCDI, project number 5 Sol/2017 and ODSI within PNCDI III.

References

  1. 1.
    Cristodorescu, M., Jha, S., Sanjit, A., Song, S.D., Bryant, R.E.: Semantics-aware malware detection, Carnegie Mellon University Research Showcase @CMU, p. 2 (2005)Google Scholar
  2. 2.
    Blasing, T., Batyuk, L., Schmidt, A.D., Camtepe, S.A., Albayrak, S.: An Andriod application sandbox system for suspicious software detection. In: 5th International Conference on Malicious and Unwanted Software, pp. 55–56 (2010)Google Scholar
  3. 3.
    Islam, R., Tian, R., Batten, L.M., Versteeg, S.: Classification of malware based on integrated static and dynamic features. J. Netw. Comput. Appl. 36(2), 646–656 (2013)CrossRefGoogle Scholar
  4. 4.
    Malhotra, A., Bajaj, K.: A survey on various malware detection techniques on mobile platform. Int. J. Comput. Appl. 139(5), 15–20 (2016)Google Scholar
  5. 5.
    Simmonds, M.: How businesses can navigate the growing tide of ransomware attacks. Comput. Fraud. Secur. 3, 9–12 (2017)CrossRefGoogle Scholar
  6. 6.
    Jadhav, S.: An assistive system for android malware analysis to increase malware analysis efficiency. In: 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 370–374 (2017)Google Scholar
  7. 7.
    Chapman, C.: Network Performance and Security: Testing and Analyzing Using Open Source and Low-cost Tools. Syngress (2016)Google Scholar
  8. 8.
    Johansen, G., Allen, L., Heriyanto, T., Ali, S.: Kali Linux 2–Assuring Security by Penetration Testing. Packt Publishing Ltd. (2016)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • George Suciu
    • 1
    • 3
    Email author
  • Laurentiu Bezdedeanu
    • 1
  • Cristiana Istrate
    • 1
    • 3
  • Mari-Anais Sachian
    • 1
  • Houssam Boukoulo
    • 2
  • Corentin Boscher
    • 2
  • Fabien Souleyreau
    • 2
  • Eduard-Cristian Popovici
    • 3
  1. 1.R&D DepartmentBeia Consult InternationalBucharestRomania
  2. 2.Institut National Polytechnique de BordeauxTalenceFrance
  3. 3.ETTI FacultyUniversity POLITEHNICA of BucharestBucharestRomania

Personalised recommendations