This is an outdated version published on 2020-12-21. Read the most recent version.

Mobile Malware Behaviour through Opcode Analysis

Authors

  • Noor Azleen Anuar Universiti Teknikal Malaysia Melaka (UTeM)
  • Mohd Zaki Mas’ud Universiti Teknikal Malaysia Melaka (UTeM)
  • Nazrulazhar Bahamanan Universiti Teknikal Malaysia Melaka (UTeM)
  • Nor Azman Mat Ariff Universiti Teknikal Malaysia Melaka (UTeM)

DOI:

https://doi.org/10.17762/ijcnis.v12i3.4732

Abstract

As the popularity of mobile devices are on the rise, millions of users are now exposed to mobile malware threats. Malware is known for its ability in causing damage to mobile devices. Attackers often use it as a way to use the resources available and for other cybercriminal benefits such stealing users’ data, credentials and credit card number. Various detection techniques have been introduced in mitigating mobile malware, yet the malware author has its own method to overcome the detection method. This paper presents mobile malware analysis approaches through opcode analysis. Opcode analysis on mobile malware reveals the behaviour of malicious application in the binary level. The comparison made between the numbers of opcode occurrence from a malicious application and benign shows a significance traits. These differences can be used in classifying the malicious and benign mobile application.

Author Biographies

Noor Azleen Anuar, Universiti Teknikal Malaysia Melaka (UTeM)

Faculty of Information Technology and Communication

Mohd Zaki Mas’ud, Universiti Teknikal Malaysia Melaka (UTeM)

Faculty of Information Technology and Communication

Nazrulazhar Bahamanan, Universiti Teknikal Malaysia Melaka (UTeM)

Faculty of Information Technology and Communication

Nor Azman Mat Ariff, Universiti Teknikal Malaysia Melaka (UTeM)

Faculty of Information Technology and Communication

Downloads

Published

2020-12-21

Versions

How to Cite

Anuar, N. A., Mas’ud, M. Z., Bahamanan, N., & Mat Ariff, N. A. (2020). Mobile Malware Behaviour through Opcode Analysis. International Journal of Communication Networks and Information Security (IJCNIS), 12(3). https://doi.org/10.17762/ijcnis.v12i3.4732

Issue

Section

Surveys / Reviews