Android Security Analysis using Mobile Sandbox
Main Article Content
Abstract
Today, smartphones and Android devices are effectively in development like never before and have become the easiest cybercrime forum. It is necessary for security experts to investigate the vengeful programming composed for these frameworks if we closely observe the danger to security and defence. The main objective of this paper was to describe Mobile Sandbox, which is said to be a platform intended to periodically examine Android applications in new ways. First of all in the essence of the after-effects of static analysis that is used to handle the dynamic investigation, it incorporates static and dynamic examination and attempts to justify the introduction of executed code. On the other hand, to log calls to native APIs, it uses those techniques, and in the end, it combines the end results with machine learning techniques to collect the samples analysed into dangerous ones. We reviewed the platform for more than 69, 000 applications from multi-talented Asian international businesses sectors and found that about 21% of them officially use the local calls in their code.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
Mobilesandbox : using static and dynamic analysis.http://campar.in.tum.de/pub/spreitzenbarth2015mobilesandbox/spreitzenbarth2015mobilesandbox.pdf
Android Developers.: Using the Android emulator https://developer.android.com/guide/developing/devices/emulator.html.
Android Developers.: Android platform versions
http://developer.android.com/about/dashboards/index.html
Static and malware detection for Android malware detection
Echtler, F.: ltrace for Android.