Towards the methods of analysis malicious applications for Android operating system

It is considered to the problem of analysis of Android applications to study a malicious behaviour. The methods of analysis are presented, the general method, which combines different analysis techniques (static, dynamic, decompilation, debugging, logging) is proposed, and information of our softwar...

詳細記述

書誌詳細
出版年:Труды Института системного программирования РАН
第一著者: S. M. Staroletov
フォーマット: 論文
言語:英語
出版事項: Russian Academy of Sciences, Ivannikov Institute for System Programming 2018-10-01
主題:
オンライン・アクセス:https://ispranproceedings.elpub.ru/jour/article/view/453
_version_ 1848653314954100736
author S. M. Staroletov
author_facet S. M. Staroletov
author_sort S. M. Staroletov
collection DOAJ
container_title Труды Института системного программирования РАН
description It is considered to the problem of analysis of Android applications to study a malicious behaviour. The methods of analysis are presented, the general method, which combines different analysis techniques (static, dynamic, decompilation, debugging, logging) is proposed, and information of our software based on it is given.
format Article
id doaj-c2f2e18c026c4607bb92402bef600de6
institution Directory of Open Access Journals
issn 2079-8156
2220-6426
language English
publishDate 2018-10-01
publisher Russian Academy of Sciences, Ivannikov Institute for System Programming
record_format Article
spelling doaj-c2f2e18c026c4607bb92402bef600de62025-11-02T20:55:47ZengRussian Academy of Sciences, Ivannikov Institute for System ProgrammingТруды Института системного программирования РАН2079-81562220-64262018-10-01301556810.15514/ISPRAS-2018-30(1)-4453Towards the methods of analysis malicious applications for Android operating systemS. M. Staroletov0Алтайский государственный технический университет им. И.И. ПолзуноваIt is considered to the problem of analysis of Android applications to study a malicious behaviour. The methods of analysis are presented, the general method, which combines different analysis techniques (static, dynamic, decompilation, debugging, logging) is proposed, and information of our software based on it is given.https://ispranproceedings.elpub.ru/jour/article/view/453анализ поведения программвредоносное программное обеспечениеутечки данныхпрограммно-техническая экспертиза
spellingShingle S. M. Staroletov
Towards the methods of analysis malicious applications for Android operating system
анализ поведения программ
вредоносное программное обеспечение
утечки данных
программно-техническая экспертиза
title Towards the methods of analysis malicious applications for Android operating system
title_full Towards the methods of analysis malicious applications for Android operating system
title_fullStr Towards the methods of analysis malicious applications for Android operating system
title_full_unstemmed Towards the methods of analysis malicious applications for Android operating system
title_short Towards the methods of analysis malicious applications for Android operating system
title_sort towards the methods of analysis malicious applications for android operating system
topic анализ поведения программ
вредоносное программное обеспечение
утечки данных
программно-техническая экспертиза
url https://ispranproceedings.elpub.ru/jour/article/view/453
work_keys_str_mv AT smstaroletov towardsthemethodsofanalysismaliciousapplicationsforandroidoperatingsystem