Provided by: IJST
Date Added: Sep 2013
Android devices are targeted by malicious developers whose aim is to infiltrate these equipments in order to manipulate user's data. They insert malicious code inside the applications they publish into Google Play or unofficial app-stores. Once installed, these apps disguise and send back information to the attacker's server. In general, mobile malware can be analyzed using two different and complementary techniques: static and dynamic analysis. The first one consists on scrutinizing behavior of malware during execution and the second consists on the reverse engineering of the malicious application from the .apk and mainly focuses on AndroidManifest.xml and classes.dex files.