Towards the methods of analysis malicious applications for Android operating system
It is considered to the problem of analysis of Android applications to study a malicious behaviour. The methods of analysis are presented, the general method, which combines different analysis techniques (static, dynamic, decompilation, debugging, logging) is proposed, and information of our softwar...
| Published in: | Труды Института системного программирования РАН |
|---|---|
| Main Author: | S. M. Staroletov |
| Format: | Article |
| Language: | English |
| Published: |
Russian Academy of Sciences, Ivannikov Institute for System Programming
2018-10-01
|
| Subjects: | |
| Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/453 |
Similar Items
Secure code execution system operation algorithm
by: A. V. Kozachok, et al.
Published: (2018-10-01)
by: A. V. Kozachok, et al.
Published: (2018-10-01)
Verified program code execution system prototype
by: A. V. Kozachok, et al.
Published: (2018-10-01)
by: A. V. Kozachok, et al.
Published: (2018-10-01)
CОВРЕМЕННЫЕ АЛГОРИТМЫ ОБРАБОТКИ ДАННЫХ ТРАНСКРИПТОМОВ: ОБЗОР МЕТОДОВ И РЕЗУЛЬТАТЫ АПРОБАЦИИ
Published: (2021-04-01)
Published: (2021-04-01)
Программное обеспечение для автоматизированного распознавания и оцифровки архивных данных оптических наблюдений полярных сияний
by: Andrei Vorobev, et al.
Published: (2023-09-01)
by: Andrei Vorobev, et al.
Published: (2023-09-01)
Методика сбора данных об активности вредоносного программного обеспечения под ОС Windows на базе MITRE ATT&CK
by: Danil Smirnov, et al.
Published: (2024-05-01)
by: Danil Smirnov, et al.
Published: (2024-05-01)
SELF-Adaptability SOFTWARE FOR IMAGE ANALYSIS
by: A. M. Nedzved, et al.
Published: (2019-06-01)
by: A. M. Nedzved, et al.
Published: (2019-06-01)
Белорусское программное обеспечение для автоматизации процессов контроля (надзора) в области ядерной и радиационной безопасности
by: Светлана Сытова, et al.
Published: (2017-08-01)
by: Светлана Сытова, et al.
Published: (2017-08-01)
Continuous integrating modules of distributed applied software packages in Orlando Tools
by: Alexander Gennadievitch Feoktistov, et al.
Published: (2019-06-01)
by: Alexander Gennadievitch Feoktistov, et al.
Published: (2019-06-01)
Обзор и сравнительный анализ BPMN-систем для роботизации бизнес-процессов
by: И.Н. Баранов
Published: (2022-09-01)
by: И.Н. Баранов
Published: (2022-09-01)
Free software using with an example OpenOffice.org
by: M N Rovkov
Published: (2011-03-01)
by: M N Rovkov
Published: (2011-03-01)
Survey on static program analysis results refinement approaches
by: A. Y. Gerasimov
Published: (2018-10-01)
by: A. Y. Gerasimov
Published: (2018-10-01)
Short review of Linux operation system as an example of free software
by: M N Rovkov
Published: (2010-12-01)
by: M N Rovkov
Published: (2010-12-01)
Applying dynamic analysis to programs running in interpreted environments
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
An approach of reachability determination for static analysis defects with help of dynamic symbolic execution
by: A. Y. Gerasimov, et al.
Published: (2018-10-01)
by: A. Y. Gerasimov, et al.
Published: (2018-10-01)
Software for adaptive grid construction
by: A. N. Semakin
Published: (2018-10-01)
by: A. N. Semakin
Published: (2018-10-01)
РАЦИОНАЛЬНОЕ ИСПОЛЬЗОВАНИЕ ВЫЧИСЛИТЕЛЬНЫХ МОЩНОСТЕЙ В СОВРЕМЕННЫХ ТЕНДЕНЦИЯХ РАЗВИТИЯ ЭЛЕКТРОНИКИ
by: И. О. Лазарев, et al.
Published: (2020-12-01)
by: И. О. Лазарев, et al.
Published: (2020-12-01)
ОБЗОР ПРОГРАММНЫХ СРЕДСТВ МОДЕЛИРОВАНИЯ СЕТЕЙ ПЕТРИ
by: А. А. Матющенко
Published: (2015-09-01)
by: А. А. Матющенко
Published: (2015-09-01)
INFORMATION TECHNOLOGIES IN TRAINING
by: H A Gerbekov, et al.
Published: (2017-12-01)
by: H A Gerbekov, et al.
Published: (2017-12-01)
Dynamic program analysis for error detection using goal-seeking input data generation
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
The Study into Cross-Site Request Forgery Attacks within the Framework of Analysis of Software Vulnerabilities
by: A. V. Barabanov, et al.
Published: (2018-10-01)
by: A. V. Barabanov, et al.
Published: (2018-10-01)
MATHEMATICAL MODEL AND SOFTWARE FOR microwave signals SPECTRUM ANALYZER in the RANGE 8-18 GHz
by: D. A. Kondrashov, et al.
Published: (2019-06-01)
by: D. A. Kondrashov, et al.
Published: (2019-06-01)
Dynamic analysis of programs with graphical user interface based on symbolic execution
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
Applying iterative dynamic analysis to programs with graphical user interface
by: M. K. Ermakov, et al.
Published: (2018-10-01)
by: M. K. Ermakov, et al.
Published: (2018-10-01)
Dynamic detection of Use After Free bugs
by: S. A. Asryan, et al.
Published: (2018-10-01)
by: S. A. Asryan, et al.
Published: (2018-10-01)
Анализ подходов применения программного обеспечения для проектирования изделия под заданную стоимость на этапах жизненного цикла
by: Евгений Сергеевич Масленников, et al.
Published: (2021-06-01)
by: Евгений Сергеевич Масленников, et al.
Published: (2021-06-01)
Роль и организация фармакокинетических исследований
Published: (2005-03-01)
Published: (2005-03-01)
Сравнительный анализ языков программирования C++ и Java с точки зрения обеспечения безопасности кода
by: А. К. Назарян, et al.
Published: (2024-12-01)
by: А. К. Назарян, et al.
Published: (2024-12-01)
Анализ эффективности использования программ автоматизированного бухгалтерского учета.
by: О. Ю. Когут
Published: (2015-09-01)
by: О. Ю. Когут
Published: (2015-09-01)
TECHNICAL EXPERTISE TO ESTABLISH THE CAUSE OF FRACTURE OF JAW CRUSHER ECCENTRIC SHAFT
by: A. A. Korotkiy, et al.
Published: (2017-06-01)
by: A. A. Korotkiy, et al.
Published: (2017-06-01)
Applying Java bytecode static instrumentation for software dynamic analysis
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
Buffer Overflow Detection via Static Analysis: Expectations vs. Reality
by: I. A. Dudina
Published: (2018-10-01)
by: I. A. Dudina
Published: (2018-10-01)
Attacks based on malicious perturbations on image processing systems and defense methods against them
by: D. A. Esipov, et al.
Published: (2024-12-01)
by: D. A. Esipov, et al.
Published: (2024-12-01)
An Interactive Specializer Based on Partial Evaluation for a Java Subset
by: I. A. Adamovich, et al.
Published: (2018-10-01)
by: I. A. Adamovich, et al.
Published: (2018-10-01)
Numerical modeling of heat transfer of channel with shallow curly dimples
by: A. . Tsynaeva, et al.
Published: (2018-10-01)
by: A. . Tsynaeva, et al.
Published: (2018-10-01)
Numerical modeling of rectangular channel with shallow dumbbell dimples based Code Saturne
by: A. . Tsynaeva, et al.
Published: (2018-10-01)
by: A. . Tsynaeva, et al.
Published: (2018-10-01)
New software to standardize the assessment of embolization of cerebral arteriovenous malformations
by: Г. С. Сергеев, et al.
Published: (2015-10-01)
by: Г. С. Сергеев, et al.
Published: (2015-10-01)
О применени программного обеспечения тестирующего контроля при дистанционном обучении специалистов по оперативно-тактической деятельности
by: Иван Полевода, et al.
Published: (2019-02-01)
by: Иван Полевода, et al.
Published: (2019-02-01)
THEORETICAL BASIS AND METHODICAL POTENTIAL OF A COMPUTER LINGUISTICS CLASSROOM BASED ON FREE AND OPEN SOURCE SOFTWARE
by: Mikhail Kamensky, et al.
Published: (2022-05-01)
by: Mikhail Kamensky, et al.
Published: (2022-05-01)
Interprocedural taint analysis for LLVM-bitcode
by: V. K. Koshelev, et al.
Published: (2018-10-01)
by: V. K. Koshelev, et al.
Published: (2018-10-01)
Анализ эффективности принятия решений в мультиверсионном программировании
by: А. А. Торгашин, et al.
Published: (2025-08-01)
by: А. А. Торгашин, et al.
Published: (2025-08-01)
Similar Items
-
Secure code execution system operation algorithm
by: A. V. Kozachok, et al.
Published: (2018-10-01) -
Verified program code execution system prototype
by: A. V. Kozachok, et al.
Published: (2018-10-01) -
CОВРЕМЕННЫЕ АЛГОРИТМЫ ОБРАБОТКИ ДАННЫХ ТРАНСКРИПТОМОВ: ОБЗОР МЕТОДОВ И РЕЗУЛЬТАТЫ АПРОБАЦИИ
Published: (2021-04-01) -
Программное обеспечение для автоматизированного распознавания и оцифровки архивных данных оптических наблюдений полярных сияний
by: Andrei Vorobev, et al.
Published: (2023-09-01) -
Методика сбора данных об активности вредоносного программного обеспечения под ОС Windows на базе MITRE ATT&CK
by: Danil Smirnov, et al.
Published: (2024-05-01)
