JOURNAL ARTICLE

Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis

Ridho Surya KusumaM. Agung Putra

Year: 2025 Journal:   JISKA (Jurnal Informatika Sunan Kalijaga) Vol: 10 (1)Pages: 122-138   Publisher: Pusat Layanan Difabel

Abstract

The increasing prevalence of Android devices has made them prime targets for malware attacks. These malicious programs pose a significant threat, causing financial loss through unauthorized premium-rate SMS messages and jeopardizing user privacy by stealing sensitive data like login credentials and contact information. The potential for downloaded malware to further compromise the device by installing additional malicious applications is even more concerning. To combat this growing menace, researchers are actively exploring methods to identify and mitigate these threats. This study investigates the effectiveness of reverse engineering as a tool for analyzing suspicious Android applications. Reverse engineering involves meticulously disassembling the application's code, deconstructing its functionalities, and revealing its underlying mechanisms. We uncovered its malicious capabilities by applying this technique to a suspected malware-infected application. This analysis used six stages: Initialization, decompilation, static analysis, code reversing, behavioral analysis, and reporting. This research underscores the power of reverse engineering as a valuable tool for deconstructing the functionalities of Android malware. By understanding how these malicious programs operate, we can develop more robust detection and prevention methods to safeguard Android users from these evolving threats. This research successfully obtained data and information about the virus and the number of attackers. The result also involves the list of specific files that contain malware indicators, so it would be used in the future to enhance detection system.

Keywords:
Malware Android (operating system) Reverse engineering Computer security Computer science Cryptovirology Malware analysis Android malware Information sensitivity Login Operating system

Metrics

2
Cited By
10.65
FWCI (Field Weighted Citation Impact)
0
Refs
0.91
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Digital and Cyber Forensics
Physical Sciences →  Computer Science →  Information Systems
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Reverse Engineering Reverse Engineering Analysis Forensic Malware WEBC2-Div

Raditya Faisal Waliulu

Journal:   Journal of Informatics Information System Software Engineering and Applications (INISTA) Year: 2018 Vol: 1 (1)
JOURNAL ARTICLE

REVERSE ENGINEERING ANALYSIS FORENSIC MALWARE WEBC2-DIV

Raditya Faisal WaliuluTeguh Hidayat Iskandar Alam

Journal:   KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Year: 2018 Vol: 2 (1)
JOURNAL ARTICLE

Reverse Engineering Analysis Statis Forensic Malware Webc2-Div

Raditya Faisal WaliuluTeguh Hidayat Iskandar Alam

Journal:   Insect (Informatics and Security) Jurnal Teknik Informatika Year: 2019 Vol: 4 (1)Pages: 15-19
JOURNAL ARTICLE

ANALISIS MALWARE ANDROID MENGGUNAKAN METODE REVERSE ENGINEERING

Frenvol De Santonario Magno MoisesJoko Dwi Santoso

Journal:   Jurnal Ilmiah Dan Karya Mahasiswa Year: 2023 Vol: 1 (2)Pages: 41-53
JOURNAL ARTICLE

Analisis Malware Android Menggunakan Metode Reverse Engineering

Bagus Aji SaputroLisan Iqbal AlfitraRaykhan Bima Oktaviaji

Journal:   Jurnal Repositor Year: 2020 Vol: 2 (10)Pages: 1331-1337
© 2026 ScienceGate Book Chapters — All rights reserved.