Analysis of Uapush Malware Infection using Static and Behavior Method on Android

Main Authors: Syaifuddin, Syaifuddin, Sari, Zamah, Masduqi, Mohammad Khairul
Format: Article info application/pdf eJournal
Bahasa: eng
Terbitan: Universitas Muhammadiyah Malang , 2018
Subjects:
Online Access: http://kinetik.umm.ac.id/index.php/kinetik/article/view/265
http://kinetik.umm.ac.id/index.php/kinetik/article/view/265/pdf
ctrlnum article-265
fullrecord <?xml version="1.0"?> <dc schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><title lang="en-US">Analysis of Uapush Malware Infection using Static and Behavior Method on Android</title><creator>Syaifuddin, Syaifuddin</creator><creator>Sari, Zamah</creator><creator>Masduqi, Mohammad Khairul</creator><subject lang="en-US">Teknik informatika, Digital Forensik, Malware Forensik</subject><subject lang="en-US">Malware, Android, Virtualization, Uapush</subject><description lang="en-US">This research combines static and behavior analysis to detect malwares on Android system. The analysis process was completed by implementing analysis process on a malware-infected application running on an Android device. The analysis process was implemented based on specific stages, started from implementing behavior analysis on a malware-infected application running on Android device. Moreover, this behavior analysis ran the application on an Android emulator; afterwards, the file processing running on Android would be analyzed using the tool designed on this research to determine whether or not the executed application has been infected by malware. By utilizing behavior analysis, this research aimed to construct LiME kernel module being able to be executed on Android to collect data running on Android memory. This collected data would be analyzed further using volatility as data scanning. The second analysis utilized static analysis by checking the application on android system before running. During the static analysis, the application extraction was executed to generate some files to be analyzed to verify malware infection.</description><publisher lang="en-US">Universitas Muhammadiyah Malang</publisher><contributor lang="en-US"/><date>2018-01-03</date><type>Journal:Article</type><type>Other:info:eu-repo/semantics/publishedVersion</type><type>Other:</type><type>File:application/pdf</type><identifier>http://kinetik.umm.ac.id/index.php/kinetik/article/view/265</identifier><identifier>10.22219/kinetik.v3i1.265</identifier><source lang="en-US">Kinetik; Vol 3, No 1, February-2018; 81-90</source><source>2503-2267</source><source>2503-2259</source><source>10.22219/kinetik.v3i1</source><language>eng</language><relation>http://kinetik.umm.ac.id/index.php/kinetik/article/view/265/pdf</relation><rights lang="en-US">Copyright (c) 2018 KINETIK</rights><rights lang="en-US">http://creativecommons.org/licenses/by-nc/4.0</rights><recordID>article-265</recordID></dc>
language eng
format Journal:Article
Journal
Other:info:eu-repo/semantics/publishedVersion
Other
Other:
File:application/pdf
File
Journal:eJournal
author Syaifuddin, Syaifuddin
Sari, Zamah
Masduqi, Mohammad Khairul
title Analysis of Uapush Malware Infection using Static and Behavior Method on Android
publisher Universitas Muhammadiyah Malang
publishDate 2018
topic Teknik informatika
Digital Forensik
Malware Forensik
Malware
Android
Virtualization
Uapush
url http://kinetik.umm.ac.id/index.php/kinetik/article/view/265
http://kinetik.umm.ac.id/index.php/kinetik/article/view/265/pdf
contents This research combines static and behavior analysis to detect malwares on Android system. The analysis process was completed by implementing analysis process on a malware-infected application running on an Android device. The analysis process was implemented based on specific stages, started from implementing behavior analysis on a malware-infected application running on Android device. Moreover, this behavior analysis ran the application on an Android emulator; afterwards, the file processing running on Android would be analyzed using the tool designed on this research to determine whether or not the executed application has been infected by malware. By utilizing behavior analysis, this research aimed to construct LiME kernel module being able to be executed on Android to collect data running on Android memory. This collected data would be analyzed further using volatility as data scanning. The second analysis utilized static analysis by checking the application on android system before running. During the static analysis, the application extraction was executed to generate some files to be analyzed to verify malware infection.
id IOS3660.article-265
institution Universitas Muhammadiyah Malang
institution_id 136
institution_type library:university
library
library Perpustakaan Universitas Muhammadiyah Malang
library_id 546
collection Kinetik Game Technology, Information System, Computer Network, Computing, Electronics, and Control
repository_id 3660
subject_area Data Processing, Computer Science/Pemrosesan Data, Ilmu Komputer, Teknik Informatika
Electronics/Teknik Elektronika
city MALANG
province JAWA TIMUR
repoId IOS3660
first_indexed 2018-01-10T00:35:44Z
last_indexed 2018-06-20T00:05:20Z
recordtype dc
merged_child_boolean 1
_version_ 1685998630529400832
score 17.607244