Millions of books in English, Spanish and other languages. Free UK delivery 

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Mobile Konami Codes: Analysis of Android Malware Services Utilizing Sensor and Resource-Based State Changes
Type
Physical Book
Illustrated by
Language
Inglés
Pages
130
Format
Paperback
Dimensions
28.0 x 21.6 x 0.7 cm
Weight
0.32 kg.
ISBN13
9781523238798

Mobile Konami Codes: Analysis of Android Malware Services Utilizing Sensor and Resource-Based State Changes

Naval Postgraduate School (Author) · Penny Hill Press Inc (Illustrated by) · Createspace Independent Publishing Platform · Paperback

Mobile Konami Codes: Analysis of Android Malware Services Utilizing Sensor and Resource-Based State Changes - Penny Hill Press Inc ; Naval Postgraduate School

New Book

£ 15.65

  • Condition: New
Origin: U.S.A. (Import costs included in the price)
It will be shipped from our warehouse between Friday, July 19 and Friday, July 26.
You will receive it anywhere in United Kingdom between 1 and 3 business days after shipment.

Synopsis "Mobile Konami Codes: Analysis of Android Malware Services Utilizing Sensor and Resource-Based State Changes"

Society's pervasive use of mobile technologies has provided an incentive for the amount and kinds of mobile malware to steadily increase since 2004. Challenges in static analysis of mobile malware have stimulated the need for emulated, dynamic analysis techniques. Unfortunately, emulating mobile devices is nontrivial because of the different types of hardware features onboard (e.g., sensors) and the manner in which users interact with their devices as compared to traditional computing platforms. To test this, our research focuses on the enumeration and comparison of static attributes and event values from sensors and dynamic resources on Android runtime environments, both from physical devices and online analysis services. Utilizing our results from enumeration, we develop two different Android applications that are successful in detecting and evading the emulated environments utilized by those mobile analysis services during execution. When ran on physical devices, the same applications successfully perform a pseudo-malware action and send device identifying information to our server for logging.

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews