DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis
We suggest an idea to dump executable code from memory for malicious application analysis on Android platform. Malicious applications are getting enhanced in terms of antianalysis techniques. Recently, sophisticated malicious applications have been found, which are not decompiled and debugged by exi...
Main Authors: | Dongwoo Kim, Jin Kwak, Jaecheol Ryou |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2015-09-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2015/379682 |
Similar Items
-
Highlight and execute suspicious paths in Android malware
by: Leslous, Mourad
Published: (2018) -
Deep Feature Extraction and Classification of Android Malware Images
by: Jaiteg Singh , et al.
Published: (2020-12-01) -
Framework for Analysis of Android Malware
by: Kim, Ye Kyung
Published: (2014) -
Android application evolution and malware detection
by: Shi, Wenjie
Published: (2016) -
Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection
by: Yun-Chung Chen, et al.
Published: (2021-01-01)