CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Source Code Analysis for Software Vulnerabilities in Android based Mobile Devices

by R. Dhaya, M. Poongodi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 17
Year of Publication: 2014
Authors: R. Dhaya, M. Poongodi
10.5120/16426-5911

R. Dhaya, M. Poongodi . Source Code Analysis for Software Vulnerabilities in Android based Mobile Devices. International Journal of Computer Applications. 93, 17 ( May 2014), 10-14. DOI=10.5120/16426-5911

@article{ 10.5120/16426-5911,
author = { R. Dhaya, M. Poongodi },
title = { Source Code Analysis for Software Vulnerabilities in Android based Mobile Devices },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 17 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 10-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number17/16426-5911/ },
doi = { 10.5120/16426-5911 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:15:58.911850+05:30
%A R. Dhaya
%A M. Poongodi
%T Source Code Analysis for Software Vulnerabilities in Android based Mobile Devices
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 17
%P 10-14
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Smartphone users are growing very fast in recent years, along with this mobile threats also increasing side by side. A mobile malware is a malicious code that aims to harm the devices . Malwares can cause system failure, decreasing battery charges, steals the information and corrupts data and go up the maintenance cost. So mobile phone security is vital one. Downloading mobile apps from the third party play store is risky one because a malware programmer inserts malevolent code into this. Users use these applications in their mobile phones and the malicious code misuse it without their knowledge. So many techniques are used to detect malwares. This paper uses a source/static code analysis to find the vulnerabilities in the applications and it also uses N-gram analysis to detect unknown malware characteristics.

References
  1. Kirti Mathur,Saroj Hiranwal, 2013 A Survey on Techniques in Detection analyzing malware executables" International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3,Issues 4,pp 422-428.
  2. P. Vinod,V. Laxmi, M. S. Gaur,2009 Survey on Malware Detection Methods,3rd Hackers Workshop on Computer and Internet Security,Department of Computer Science Engineering, Prabhu Goel Research Centre for Computer and Internet Security,IIT,Kanpur,PP. 74-79.
  3. A. Bose, X. Hu Kang,G. Shin and T. Park, 2009 Behavioral Detection of Malware on Mobile Handsets, IEEE International Conference on Mobile Systems, Applications, Services , pp 225-238.
  4. Marwa M. A. Elfattah,Aliaaa A. A. Yousif and Ebada sarhan amhed,2011 Handsets Malware Threats and Facing Techniques,International Journal of Advanced Computer Science and Applications , Vol. 2,No. 12,pp 42-48.
  5. Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther Schmidt, Jan Clausen, Osman Kiraz , Kamer Ali Yuksel, Seyit Ahmet Camtepe, and Sahin Albayrak, 2009 Static Analysis of Executables for Collaborative Malware Detection on Android, IEEE International Conference on Communications,pp: 1-5.
  6. Dex2Jar [Online] Available: https://code. google. com/p/dex2jar/downloads/list Date Accessed: 2014 January.
  7. Android APKTOOL [Online], Available: http://code. google. com/p/android-apktoolDate Accessed: 2014 January.
  8. Java Decompiler [Online], Available: http://java. decompiler. free. fr/?q=jdgui, Date Accessed: 2014 January.
  9. APK2JAVA [Online], Available: https://code. google. com/apk2java/downloads/detail?name=apk2java_v_1. 0. zip,Date accessed:2014 January.
  10. Igor Santos,Yoseba P. Kenyas,Jamie Devesa and Pablo G. Bringas, 2009 N-gram Based File Signatures for Malware Detection , International Conference on Enterprise Information Systems(ICEIS), pp 317-320.
  11. Common Vulnerability Scoring System (CVSS) [Online] Available:https://nvd. nist. gov/cvss. cfm?calculator&adv&version=2&vector
  12. Assad Ali, Pavol Zavarsky, Dale Lindskog, Ron Ruhl , 2011 A New CVSS-Based Tool to Mitigate the Effects of Software Vulnerabilities, International Journal for Information Security Research (IJISR), Volume 1, Issue 4, and pp: 178-182.
  13. R. Dhaya and M. Poongodi, 2014 Mobile Virus Prevention Techniques: A Survey Perspective, International Journal of Innovative Research in Computer and Communication Engineering,Vol 2,Issue 1,pp. 1980-1985.
  14. R. Dhaya and M. Poongodi, 2014 "Preventing and Controlling Virus Dissemination in Mobile Devices", Proceedings of the International Conference on Science and Innovative Engineering, ISBN 978-81-904760-5-8.
Index Terms

Computer Science
Information Sciences

Keywords

Malware Android Static Analysis N-Gram SVM Vulnerability CVSS