International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 135 | Views: 263

Research Paper | Information Technology | India | Volume 3 Issue 5, May 2014 | Popularity: 6.7 / 10


     

Detection of Malware Intrusion during Application Update in Android

Parth Chhabhaiya, D. A. Parikh


Abstract: Android is a popular mobile device platform developed by Google. Android Application is now part of our day to day life; and there are several confidential data store in mobile devices. Most of the Android users are unaware about security of data and therefore many users data is unsecure. Recently; the threat of Android malware is spreading rapidly. Therefore several Android Applications are defected by malware. Defected apps manipulate personal information such as SMS messages and Contacts; and leakage of such information may cause great loss to the android users. Till now we have solution for finding repackaged application. But these mechanisms are not capable to finding update attack. In update attack malware code are placed in android application at a time of application update. Therefore static methods are not capable for it.


Keywords: Android, Malware, Android Apps, Security


Edition: Volume 3 Issue 5, May 2014


Pages: 335 - 338



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Parth Chhabhaiya, D. A. Parikh, "Detection of Malware Intrusion during Application Update in Android", International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2014, pp. 335-338, URL: https://www.ijsr.net/getabstract.php?paperid=20131805, DOI: https://www.doi.org/10.21275/20131805



Downloads: 357 | Views: 1005

Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir


Downloads: 301 | Views: 564

Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya, G. Renuka Devi


Downloads: 266 | Views: 413

Information Technology, China, Volume 9 Issue 1, January 2020

Pages: 107 - 112

Network Optimization using Multi-Agent Genetic Algorithm

Sikandar Hanif


Downloads: 260 | Views: 478

Information Technology, Malaysia, Volume 8 Issue 1, January 2019

Pages: 64 - 70

University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR

Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan


Downloads: 254 | Views: 423

Information Technology, India, Volume 9 Issue 1, January 2020

Pages: 477 - 479

IoT Based Smart Street Light for Energy Efficiency and Safety

Tanmay Patil, Arjun Ramendra


Top