Abstract

Android is a very attractive platform for malware developers because it is widely used. There is a need to understand how malware works and how it can exploit a system's security architecture. To do so, this work decompiles Android malware applications to study their source code and to look for patterns, regarding instructions, method calls, and permission usage. The goal is to define a set of instruction-based signatures that identify dangerous behavior and to use the identified signatures as a base for developing tools for code analysis.

Keywords:
Malware Computer science Android (operating system) Exploit Permission Cryptovirology Android malware Static analysis Computer security Malware analysis Source code Operating system Programming language

Metrics

3
Cited By
0.00
FWCI (Field Weighted Citation Impact)
10
Refs
0.12
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Digital and Cyber Forensics
Physical Sciences →  Computer Science →  Information Systems
© 2026 ScienceGate Book Chapters — All rights reserved.