
handle: 20.500.12358/28272
Many researches were done to find creative techniques, for Android platform, that can detect malware in easy and reliable manner. The aim is not only the effectiveness but to have less processing time, and less resources consumption. This research provide a solution for a part of this problem by finding an easy and fast way to analyze static application code and to generate its figure-print or signature to be used later in similarity measurement with available database of malwares signatures. We proposed a new method depends on SimHash algorithm which generate signature for reverse code from .apk android package kit. We compare the proposed algorithm with an existing Androguard tool, which also analyze static code and generate signatures using reverse engineering. We found that the proposed method saves 70% of time with similar results and time distribution behavior in comparison with Androguard.
Android, operation systems, Malware
Android, operation systems, Malware
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
