Reference Hub2
Androscanreg 2.0: Enhancement of Android Applications Analysis in a Flexible Blockchain Environment

Androscanreg 2.0: Enhancement of Android Applications Analysis in a Flexible Blockchain Environment

Abdellah Ouaguid, Fadwa Fathi, Mouad Zouina, Mohammed Ouzzif, Noreddine Abghour
Copyright: © 2022 |Volume: 10 |Issue: 1 |Pages: 28
ISSN: 2166-7160|EISSN: 2166-7179|EISBN13: 9781683182832|DOI: 10.4018/IJSI.309724
Cite Article Cite Article

MLA

Ouaguid, Abdellah, et al. "Androscanreg 2.0: Enhancement of Android Applications Analysis in a Flexible Blockchain Environment." IJSI vol.10, no.1 2022: pp.1-28. http://doi.org/10.4018/IJSI.309724

APA

Ouaguid, A., Fathi, F., Zouina, M., Ouzzif, M., & Abghour, N. (2022). Androscanreg 2.0: Enhancement of Android Applications Analysis in a Flexible Blockchain Environment. International Journal of Software Innovation (IJSI), 10(1), 1-28. http://doi.org/10.4018/IJSI.309724

Chicago

Ouaguid, Abdellah, et al. "Androscanreg 2.0: Enhancement of Android Applications Analysis in a Flexible Blockchain Environment," International Journal of Software Innovation (IJSI) 10, no.1: 1-28. http://doi.org/10.4018/IJSI.309724

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this article, the authors propose a new innovative method based on blockchain technology providing an analysis of Android applications in a decentralized, flexible, and reliable way. The proposed approach improves the typical operation of the blockchain technology that considers invalid (or “fraudulent”) any outcome different from other results found by the majority of network nodes. However, ignoring any result different from the majority without starting additional verification can cause losses in terms of data, time, computing power, or even system reliability and the integrity of its data. The purpose of the presented approach is to confirm or deny the legitimacy of any outcome different from the majority. This new concept will facilitate the detection of polymorphic programs by allowing nodes to adopt specific environments at any time to reduce the rejection of results deemed, wrongly, to be fraudulent. A proof of concept has been designed and implemented showing the feasibility of the proposed approach with a real case study.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.