Android is a very attractive platform for malware developers because it is widely used. There is a need to understand how malware works and how it can exploit a system's security architecture. To do so, this work decompiles Android malware applications to study their source code and to look for patterns, regarding instructions, method calls, and permission usage. The goal is to define a set of instruction-based signatures that identify dangerous behavior and to use the identified signatures as a base for developing tools for code analysis.
William BlancLina G. HashemKarim O. ElishM. J. Hussain Almohri
K ZhangQingshan JiangWenmiao ZhangXiwen Liao
Vitor Monte AfonsoMatheus Favero de AmorimAndré GrégioGlauco Barroso JunqueraPaulo Lício de Geus
Emily AlfsDoina CarageaDewan ChaulagainSankardas RoyNathan AlbinPietro Poggi‐Corradini
Zi WangJuecong CaiCheng SihuaWenjia Li