Reference Hub5
Identification of Cryptographic Vulnerability and Malware Detection in Android

Identification of Cryptographic Vulnerability and Malware Detection in Android

Anjali Kumawat, Anil Kumar Sharma, Sunita Kumawat
Copyright: © 2017 |Volume: 11 |Issue: 3 |Pages: 14
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522511755|DOI: 10.4018/IJISP.2017070102
Cite Article Cite Article

MLA

Kumawat, Anjali, et al. "Identification of Cryptographic Vulnerability and Malware Detection in Android." IJISP vol.11, no.3 2017: pp.15-28. http://doi.org/10.4018/IJISP.2017070102

APA

Kumawat, A., Sharma, A. K., & Kumawat, S. (2017). Identification of Cryptographic Vulnerability and Malware Detection in Android. International Journal of Information Security and Privacy (IJISP), 11(3), 15-28. http://doi.org/10.4018/IJISP.2017070102

Chicago

Kumawat, Anjali, Anil Kumar Sharma, and Sunita Kumawat. "Identification of Cryptographic Vulnerability and Malware Detection in Android," International Journal of Information Security and Privacy (IJISP) 11, no.3: 15-28. http://doi.org/10.4018/IJISP.2017070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Android based Smartphones are nowadays getting more popular. While using Smartphone, user is always concerned about security and malicious attacks, cryptographic vulnerability of the applications. With increase in the number of Android mobiles, Android malwares are also increasing very rapidly. So the authors have proposed the “Identification of cryptographic vulnerability and malware detection in Android” system. They have designed a user friendly android application, through which user and developer can easily test the application whether it is benign or vulnerable. The application will be tested firstly using static analysis and then the dynamic analysis will be carried out. The authors have implemented static and dynamic analysis of android application for vulnerable and malicious app detection. They have also created a web page. User can either use the application or the web page.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.