Detailed Information

Cited 0 time in webofscience Cited 1 time in scopus
Metadata Downloads

Survey of dynamic anti-analysis schemes for mobile malware

Authors
Lim, J.Shin, Y.Lee, S.Kim, K.YI, JEONG HYUN
Issue Date
Sep-2018
Publisher
Innovative Information Science and Technology Research Group
Keywords
Anti-debugging; Anti-emulating; Anti-rooting; Mobile code reversing
Citation
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, v.9, no.3, pp.39 - 49
Journal Title
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
Volume
9
Number
3
Start Page
39
End Page
49
URI
http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/32302
DOI
10.22667/JOWUA.2018.09.30.039
ISSN
2093-5374
Abstract
With the development of the smartphone market, the smartphone application market will grow significantly. As a result, malicious code targeting smartphones is increasing exponentially. Attackers are spreading malicious apps by embedding malicious code in the app through repackaging attacks. Small-scale payment fraud and malicious files for smart banking also skyrocketed through smishing attack targeting Android smartphone users. The intelligent attack, which refers to the type of target attack, has also become fully visible. In the future, mobile payment and electronic financial crime targeting smartphone users are expected to become more popular through malicious files based on Android spreading through smishing attack and it is predicted that various irregular mobile security threats will come true. To prepare for such attacks, several analytical tools have been developed, including a sandbox tool that can analyze Android malicious apps. However, as in PC environment, we anticipate the emergence of anti-analysis schemes that can neutralize these analytical tools. Therefore, this paper analyzes the anti-analysis schemes applied to malicious applications. By supporting the analysis of malicious applications based on the results of this work, it will be very helpful to reduce the research cost of malicious code research and to create a secure smartphone security environment. © 2019, Innovative Information Science and Technology Research Group. All rights reserved.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Software > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher YI, JEONG HYUN photo

YI, JEONG HYUN
College of Information Technology (School of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE