Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 6
Page No. 1567 - 1574

Forged Android Mobile Apps. Detection System with Server-Side Signature Verification Method

Authors : Jaekyu Lee and Hyung-Woo Lee

References

Anonymous, 2016. Dex2jar: Tools to work with android.dex and java.class files brought to you by: pxb1988. Slashdot Media and Dice Inc., Redwood City, California. https://sourceforge.net/projects/dex2jar/.

Anonymous, 2018. A fast, open source web browser engine. WebKit. https://webkit.org/

Anonymous, 2018. A tool for reverse engineering Android APK files. GitHub Inc., San Francisco, California, USA. https://github.com/iBotPeaches/Apktool.

Anonymous, 2018. Android studio the official IDE for Android. Android. https://developer.android.com/studio/index.html.

Anonymous, 2018. Angry birds classic. Rovio Entertainment, Espoo, Finland. https://play.google.com/store/apps/details?id=com.ahnlab.v3mobilesecurity.soda.

Anonymous, 2018. JD project. Java Decompiler. http://jd.benow.ca/

Anonymous, 2018. Kakao talk: Free calls and text. Kakao, Jeju City, South Korea. https://play.google.com/store/apps/details?id=com.kakao.talk.

Anonymous, 2018. Kaspersky mobile antivirus: AppLock & web security. Kaspersky Lab, Moscow, Russia. https://play.google.com/store/apps/details?id=com.kms.free.

Anonymous, 2018. Malwarebytes for Android advanced protection against malware, ransomware and other growing threats to Android devices. Malwarebytes, Santa Clara, California, USA.

Anonymous, 2018. McAfee mobile security and lock. McAfee, Santa Clara, California, USA. https://play.google.com/store/apps/details?id=com.wsandroid.suite.

Anonymous, 2018. More than 1 million google accounts breached by gooligan. Check Point Software Technologies, Tel Aviv, Israel. https://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/.

Anonymous, 2018. Sign APK is used to sign the APK file after repack: The easiest way ever. GitHub Inc., San Francisco, California, USA. https://github.com/techexpertize/SignApk.

Anonymous, 2018. Trojan: Android/fakeinst threat description. F-Secure, Helsinki, Finland. https://www.f-secure.com/v-descs/trojan_android_fakeinst.shtml.

Anonymous, 2018. Trojan: Android/vdloader a threat description. F-Secure, Helsinki, Finland. https://www.f-secure.com/v-descs/trojan_android_vdloader.shtml.

Anonymous, 2018. V3 mobile security-anti malware/booster/apps lock. AhnLab, Inc., Gyeonggi Province, South Korea. https://play.google.com/store/apps/details?id=com.ahnlab.v3mobilesecurity.soda.

Anonymous, 2018. [ShinhanSol (SOL)-Shinhan bank smartphone banking]. Shinhan Bank, Seoul, South Korea. (In Korean)

Enck, W., M. Ongtang and P. McDaniel, 2009. Understanding android security. IEEE Security Privacy, 7: 50-57.
CrossRef  |  Direct Link  |  

Faruki, P., V. Laxmi, A. Bharmal, M.S. Gaur and V. Ganmoor, 2015. AndroSimilar: Robust signature for detecting variants of Android malware. J. Inf. Secur. Appl., 22: 66-80.
CrossRef  |  Direct Link  |  

Ham, Y.J. and H.W. Lee, 2014. Malicious Trojan horse application discrimination mechanism using realtime event similarity on android mobile devices. J. Internet Comput. Serv., 15: 31-43.
CrossRef  |  Direct Link  |  

La Polla, M., F. Martinelli and D. Sgandurra, 2013. A survey on security for mobile devices. IEEE Commun. Surveys Tutorials, 15: 446-471.
CrossRef  |  Direct Link  |  

Lee, H.S. and H.W. Lee, 2015. Fake C&C server for evidence aggregation and detection of server-side polymorphic mobile malware on android platform. Intl. Inf. Inst., 18: 3723-3737.
Direct Link  |  

Lee, H.S. and H.W. Lee, 2015. Implementation of polymorphic malware DB based dynamic analysis system for android mobile applications. Intl. Inf. Inst., 18: 3187-3197.
Direct Link  |  

Lee, J. and H.W. Lee, 2018. Android mobile forged apps detection with server-side signature verification. Proceedings of the 4th International Joint Conference on Convergence (IJCC’18), January 31-February 7, 2018, Sheraton Waikiki Hotel, Honolulu, Hawaii, USA., pp: 59-60.

Rahman, M., M. Rahman, B. Carbunar and D.H. Chau, 2016. Fairplay: Fraud and Malware Detection in Google Play. In: Proceedings of the 2016 SIAM International Conference on Data Mining, Venkatasubramanian, S.C. and W. Meira (Eds.). Society for Industrial and Applied Mathematics, Philadelphia, Pennsylvania, USA., ISBN:978-1-61197-434-8, pp: 99-107.

Shabtai, A., U. Kanonov, Y. Elovici, C. Glezer and Y. Weiss, 2012. Andromaly: A behavioral malware detection framework for Android devices. J. Intell. Inform. Syst., 38: 161-190.
CrossRef  |  Direct Link  |  

Verma, S., S.K. Muttoo and S.K. Pal, 2016. MDroid: Android based malware detection using MCM classifier. Intl. J. Eng. Appl. Sci. Technol., 1: 206-215.
Direct Link  |  

Zaidi, S.F.A., M.A. Shah, M. Kamran, Q. Javaid and S. Zhang, 2016. A survey on security for smartphone device. Intl. J. Adv. Comput. Sci. Appl., 7: 206-219.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved