scholarly journals Network Activity Monitoring Against Malware in Android Operating System

Author(s):  
Luis Miguel Acosta-Guzman ◽  
Gualberto Aguilar-Torres ◽  
Gina Gallegos-Garcia

Google’s Android is the most used Operating System in mobile devices but as its popularity has increased hackers have taken advantage of the momentum to plague Google Play (Android’s Application Store) with multipurpose Malware that is capable of stealing private information and give the hacker remote control of smartphone’s features in the worst cases. This work presents an innovative methodology that helps in the process of malware detection for Android Operating System, which addresses aforementioned problem from a different perspective that even popular Anti-Malware software has left aside. It is based on the analysis of a common characteristic to all different kinds of malware: the need of network communications, so the victim device can interact with the attacker. It is important to highlight that in order to improve the security level in Android, our methodology should be considered in the process of malware detection. As main characteristic, it does not need to install additional kernel modules or to root the Android device. And finally as additional characteristic, it is as simple as can be considered for non-experienced users.

Author(s):  
Luis Miguel Acosta-Guzman ◽  
Gualberto Aguilar-Torres ◽  
Gina Gallegos-Garcia

Google’s Android is the most used Operating System in mobile devices but as its popularity has increased hackers have taken advantage of the momentum to plague Google Play (Android’s Application Store) with multipurpose Malware that is capable of stealing private information and give the hacker remote control of smartphone’s features in the worst cases. This work presents an innovative methodology that helps in the process of malware detection for Android Operating System, which addresses aforementioned problem from a different perspective that even popular Anti-Malware software has left aside. It is based on the analysis of a common characteristic to all different kinds of malware: the need of network communications, so the victim device can interact with the attacker. It is important to highlight that in order to improve the security level in Android, our methodology should be considered in the process of malware detection. As main characteristic, it does not need to install additional kernel modules or to root the Android device. And finally as additional characteristic, it is as simple as can be considered for non-experienced users.


2019 ◽  
Vol 21 (3) ◽  
pp. 91-111
Author(s):  
João Paulo De Oliveira ◽  
Rafael Felipe Pszybylski ◽  
Marcelo Souza Motta ◽  
Marco Aurélio Kalinke

The presence of smartphones in the classrooms have been the theme of big debates among those involved in educational spaces. It is undeniable that its inclusion in teaching and learning processes approaches the school to the world where the student is in and an important step to elaborate strategies which involves the smartphones use is to know the educational apps functionalities. In this context, this article is proposed to do a systematic mapping of free educational apps to the physics teaching, available at the Android operating system presented in most smartphones and available at Google Play Store. It was adopted as methodology a systematic mapping organized in four steps. At the first moment the research was made with the use of the word “Physics” and 250 apps were found, the second step was intended to select the apps with physics content in Portuguese, which brought the number of 42 apps. Following, the third step was intended to map the specific apps for the physics subjects, excluding those that present in their content several subjects or only exercises collection, finding, so, 25 apps. Lastly, in fourth step, it was made a description of the apps selected from step 3 with more than 10.000 downloads. What was noticed in the description is that practically none presents the contextualization of physical phenomena or simulations, they only highlight nature theoretical or mathematical descriptions.


Author(s):  
Kashif Ali Dahri ◽  
Muhammad Saleem Vighio ◽  
Baqar Ali Zardari

The Internet is not safe anymore, malware can be discovered anywhere on the Internet. The risk of malware has increased also due to the increasing popularity and use of Smartphones and their underlying cost-free applications. With its great market share, the Android operating system has become a prime target for malware developers. When an Android phone is injected with a malware, it may result in compromising the privacy of the user by stealing sensitive and private information like contacts, ids, passwords, photos, call records, and so on. Compared to any other Android-based application category, games are the most preferred zone for attackers, due to the high interest of users in game applications. When an end user downloads a game, which is injected with malicious code, user data is infected without bringing in the knowledge of the user. Though, there still are not sufficient protection mechanisms or guidelines stated for end user against Android malware, this study offers a novel approach to detect Android malware in order to ensure the safe usage of Android applications. The advantage of this approach is its ability to utilize Android manifest files for the detection of malware. The availability of manifest file in every Android application makes this approach applicable to all Android applications. It can also be considered as a lightweight method for malware detection, and its efficiency is experimentally confirmed by testing and comparing the results of 50 Android games samples. Experiments are carried out using the Android Package Kit (APK) tools, and based on the experiments, different kinds of malware identification and prevention guidelines have been proposed for the safe and secure usage of the Android operating system.


2014 ◽  
Vol 644-650 ◽  
pp. 2489-2492
Author(s):  
Xiao Hu Yin ◽  
Xin Ru Wang

The remote control system platform and the main function modules are studied and analyzed based on Android operating system. The problem of image transmission of remote control on Android equipment is solved by means of the analysis and comparison of several methods of screenshots and image compression, such as ImageIO compression and JPEGEncoder compression. Finally, we got the conclusion that the transmission efficiency can be increased by the screenshots with robot class and JPEGEncoder compression.


2018 ◽  
Vol 8 ◽  
pp. 220-225
Author(s):  
Tomasz Borysiewicz

Producer of Android operating system have been trying to offer ways to protect digital data on devices since 1st version of this platform. Development of possibilities of operating system and new technological solutions allows to launch more innovate protections, which are not only more secure, but also very comfortable in everyday usage. This article presents comparison of available solutions, both in terms of the best protection and convenience of usage. The topic of convenience of usage required research to collect information about the most popular configurations among users. The analysis of security level of available locks and obtained results allowed to verify whether owners of devices running Android operating system are properly securing digital data stored in internal memory of their devices


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 4321-4339 ◽  
Author(s):  
Saba Arshad ◽  
Munam A. Shah ◽  
Abdul Wahid ◽  
Amjad Mehmood ◽  
Houbing Song ◽  
...  

2015 ◽  
Vol 781 ◽  
pp. 145-148
Author(s):  
Komal Narang ◽  
Kingkarn Sookhanaphibarn ◽  
Prasong Praneetpolgrang

This research presents a model for malware detection on mobile operating system based on analyzing the operation codes. The research processes are as follows: (1) achieving of both malicious and benign codes on android operating system, (2) extracting features based on the distribution of n-grams frequency where the parameter n = 3 is used, and (3) constructing a model for classification the malicious codes using the extracted features for both malicious and benign codes. In the experiment, 304 malicious codes and 553 benign codes were using to construct the model. The experiment shows that the model achieved more than 85.52% accuracy. For the sensitivity and specificity, the model achieved 71.26% and 90.52%, respectively.


2019 ◽  
Vol 2 (2) ◽  
pp. 59-66
Author(s):  
Ida Bagus Ary Indra Iswara ◽  
Putu Praba Santika ◽  
I Nyoman Saputra Wahyu Wijaya

The Balinese language which is used in daily life on the island of Bali has experienced a shift in usage so it needs to be preserved. In an effort to preserve the Balinese language and script, the Provincial Government issued Bali Governor Regulation Number 20 of 2013 and Regulation number 1 of 2018. I Made Suatjana submitted a proposal that the Balinese script be included in Unicode to make it easier to display Balinese script on digital media. Cokorda Rai Adi Pramartha developed keyboards or keyboards and an application called T@miang to facilitate typing Balinese characters on computer devices. Computer equipment is slowly becoming obsolete, replaced by mobile devices used by 53.03% of users in Indonesia, so it is necessary to build a Balinese script keyboard that can be used on mobile devices. PaTik Bali is built for mobile devices with Android operating system. PaTik Bali layout is adapted to T@miang keyboard layout. PaTik Bali version 1.0 only uses the Balinese script on each keyboard key. In version 2.0 each button on PaTik Bali has been added Latin letters because of the large number of entries on the Google Play page. Based on data recorded on the Google Play Console, there are 41,820 devices that have installed the Balinese Keyboard (PaTik Bali) application, 99.19% are from Indonesia. In general, the PaTik Bali application can be accepted in the community, this can be seen from the average rating given by users on Google Play which is 4.27 on a scale of 5. However, some users complain about the incorrect form of letters. The PaTik Bali application uses fonts that have been embedded in the Android operating system so that it can be used as a keyboard in other applications. This font still has enough problems. To fix this problem, it is necessary to develop the Balinese font then ask Google as an Android developer to enter the new font into the Android operating system. 


SAINTEKBU ◽  
2018 ◽  
Vol 10 (2) ◽  
pp. 42-51
Author(s):  
Burhan Arifin ◽  
Zulfikar ◽  
Agus Sifaunajah

Mobile device technology is growing rapidly, especially with the emergence of smartphones with Android operating system. Users, in this case, can download a variety of basic applications available easily in the google play store. But most are available in the form of less educational games. Even often the negative impact on users, especially for children who still can not distinguish positive and negative. Thus the researchers create a puzzle game application that can provide entertainment and education to users, especially children. The puzzle game application introduces this selected computer device built using Construct 2 game engine converted with Phonegap into Apk files. Application of this application by installing puzzle game application on a smartphone with operating system specification android version 4.4.2 KitKat. Keywords: Educational Game, Computer Device, Construct 2


Sign in / Sign up

Export Citation Format

Share Document