Survey of dynamic anti-analysis schemes for mobile malware
- Authors
- Lim, J.; Shin, Y.; Lee, S.; Kim, K.; YI, JEONG HYUN
- Issue Date
- Sep-2018
- Publisher
- Innovative Information Science and Technology Research Group
- Keywords
- Anti-debugging; Anti-emulating; Anti-rooting; Mobile code reversing
- Citation
- Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, v.9, no.3, pp.39 - 49
- Journal Title
- Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
- Volume
- 9
- Number
- 3
- Start Page
- 39
- End Page
- 49
- URI
- http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/32302
- DOI
- 10.22667/JOWUA.2018.09.30.039
- ISSN
- 2093-5374
- Abstract
- With the development of the smartphone market, the smartphone application market will grow significantly. As a result, malicious code targeting smartphones is increasing exponentially. Attackers are spreading malicious apps by embedding malicious code in the app through repackaging attacks. Small-scale payment fraud and malicious files for smart banking also skyrocketed through smishing attack targeting Android smartphone users. The intelligent attack, which refers to the type of target attack, has also become fully visible. In the future, mobile payment and electronic financial crime targeting smartphone users are expected to become more popular through malicious files based on Android spreading through smishing attack and it is predicted that various irregular mobile security threats will come true. To prepare for such attacks, several analytical tools have been developed, including a sandbox tool that can analyze Android malicious apps. However, as in PC environment, we anticipate the emergence of anti-analysis schemes that can neutralize these analytical tools. Therefore, this paper analyzes the anti-analysis schemes applied to malicious applications. By supporting the analysis of malicious applications based on the results of this work, it will be very helpful to reduce the research cost of malicious code research and to create a secure smartphone security environment. © 2019, Innovative Information Science and Technology Research Group. All rights reserved.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Information Technology > School of Software > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/32302)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.