z-logo
open-access-imgOpen Access
Android Security Analysis using Mobile Sandbox
Author(s) -
Munishka Vijayvergiya,
AUTHOR_ID,
Abhignya Tayi,
Sanya jain,
Sanjana Reddy,
AUTHOR_ID,
AUTHOR_ID,
AUTHOR_ID
Publication year - 2021
Publication title -
indian journal of data communication and networking (ijdcn)
Language(s) - English
Resource type - Journals
ISSN - 2582-760X
DOI - 10.54105/ijdcn.c5015.061321
Subject(s) - sandbox (software development) , android (operating system) , computer security , computer science , static analysis , cybercrime , android application , mobile device , world wide web , software engineering , operating system , the internet , programming language
Today, smartphones and Android devices are effectively in development like never before and have become the easiest cybercrime forum. It is necessary for security experts to investigate the vengeful programming composed for these frameworks if we closely observe the danger to security and defence. The main objective of this paper was to describe Mobile Sandbox, which is said to be a platform intended to periodically examine Android applications in new ways. First of all in the essence of the after-effects of static analysis that is used to handle the dynamic investigation, it incorporates static and dynamic examination and attempts to justify the introduction of executed code. On the other hand, to log calls to native APIs, it uses those techniques, and in the end, it combines the end results with machine learning techniques to collect the samples analysed into dangerous ones. We reviewed the platform for more than 69, 000 applications from multi-talented Asian international businesses sectors and found that about 21% of them officially use the local calls in their code.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here