Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A Hidden File Extraction Scheme Defeating Malware Using Android Dynamic Loading

Full metadata record
DC Field Value Language
dc.contributor.authorYoon, H.-
dc.contributor.authorShim, H.-
dc.contributor.authorJung, S.-
dc.date.available2021-03-08T00:40:11Z-
dc.date.created2021-03-08-
dc.date.issued2020-11-
dc.identifier.issn1865-0929-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/40484-
dc.description.abstractRecently, malicious Android applications have become intelligent to bypass traditional static analysis. Among them, which using dynamic loading techniques hide malicious code by separating DEX files. These additional DEX files can be installed together during the installation time in different directory or downloaded from the command and control server. However intelligent malwares delete the DEX files after execution to avoid analysis. Therefore, It is difficult to figure out the some of hidden behavior without extracting files used for dynamic loading. In this paper, we propose a extraction algorithms to save the loaded or deleted DEX file using Xposed. After that, verifies whether the extracted DEX file is malicious by using the proposed technique. This method allows you to analyze additional actions performed by malware through analysis. As a result, it contributes to find hidden features of Application. © 2020, Springer Nature Singapore Pte Ltd.-
dc.language영어-
dc.language.isoen-
dc.publisherSpringer Science and Business Media Deutschland GmbH-
dc.relation.isPartOfCommunications in Computer and Information Science-
dc.titleA Hidden File Extraction Scheme Defeating Malware Using Android Dynamic Loading-
dc.typeArticle-
dc.identifier.doi10.1007/978-981-15-9609-4_7-
dc.type.rimsART-
dc.identifier.bibliographicCitationCommunications in Computer and Information Science, v.1121, pp.85 - 98-
dc.description.journalClass1-
dc.identifier.scopusid2-s2.0-85096487856-
dc.citation.endPage98-
dc.citation.startPage85-
dc.citation.titleCommunications in Computer and Information Science-
dc.citation.volume1121-
dc.contributor.affiliatedAuthorJung, S.-
dc.type.docTypeConference Paper-
dc.description.isOpenAccessN-
dc.subject.keywordAuthorAndroid malware-
dc.subject.keywordAuthorClassLoader-
dc.subject.keywordAuthorDynamic loading-
dc.subject.keywordAuthorJava reflection-
dc.subject.keywordAuthorMultidex-
dc.subject.keywordPlusAndroid (operating system)-
dc.subject.keywordPlusDynamic loads-
dc.subject.keywordPlusExtraction-
dc.subject.keywordPlusMalware-
dc.subject.keywordPlusMobile security-
dc.subject.keywordPlusStatic analysis-
dc.subject.keywordPlusCommand and control-
dc.subject.keywordPlusDynamic loadings-
dc.subject.keywordPlusExtraction algorithms-
dc.subject.keywordPlusInstallation time-
dc.subject.keywordPlusMalicious android applications-
dc.subject.keywordPlusMalicious codes-
dc.subject.keywordPlusMalwares-
dc.subject.keywordPlusLoading-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jung, Sou hwan photo

Jung, Sou hwan
College of Information Technology (Department of IT Convergence)
Read more

Altmetrics

Total Views & Downloads

BROWSE