Study on Analysis Methodology for Android Applications
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ju, Seung-hwan | - |
dc.contributor.author | Seo, Hee-suk | - |
dc.contributor.author | Kwak, Jin | - |
dc.date.accessioned | 2021-08-12T00:46:33Z | - |
dc.date.available | 2021-08-12T00:46:33Z | - |
dc.date.issued | 2013-09 | - |
dc.identifier.issn | 1607-9264 | - |
dc.identifier.issn | 2079-4029 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/13391 | - |
dc.description.abstract | The advance in technology brought us mobile phones with almost the same power and features as our personal computers. Something that criminal minds will find a way to exploit for their gain as the history has shown. The main contents of the information paradigm are the "open" and "standard." Full security incidents account for more than 80 percent of the internal information security incidents (abuse of information resources and information leakage, etc.), damages the value of information assets has increased rapidly. Mobile malware is rapidly becoming a serious threat. In this paper, I survey the current state of mobile malware. As I classified according to behavioral characteristics and propagation and understood the history mobile evolution. Also, I present Android Application analysis methodology for the more securing smart-work environment. | - |
dc.format.extent | 7 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | National Dong Hwa University | - |
dc.title | Study on Analysis Methodology for Android Applications | - |
dc.type | Article | - |
dc.publisher.location | 대만 | - |
dc.identifier.doi | 10.6138/JIT.2013.14.5.14 | - |
dc.identifier.scopusid | 2-s2.0-84890378891 | - |
dc.identifier.wosid | 000325239100014 | - |
dc.identifier.bibliographicCitation | Journal of Internet Technology, v.14, no.5, pp 851 - 857 | - |
dc.citation.title | Journal of Internet Technology | - |
dc.citation.volume | 14 | - |
dc.citation.number | 5 | - |
dc.citation.startPage | 851 | - |
dc.citation.endPage | 857 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | ALGORITHM | - |
dc.subject.keywordAuthor | Application analysis | - |
dc.subject.keywordAuthor | Dynamic analysis | - |
dc.subject.keywordAuthor | Android system | - |
dc.subject.keywordAuthor | Mobile security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.