Published December 9, 2025
| Version v1
Journal article
Open
ANDROID MALWARE DETECTION FROM APK FILE
Authors/Creators
Description
Abstract
The rapid-fire spread of the Android bias has converted the technological trend throughout the world and Android is the most extensively applied mobile operating system. Android has proved a perfect victim to vicious actors, who only need to exploit their vulnerability to compromise their system to achieve fiscal earnings, steal data or disrupt the system, which is open- source in nature and has a huge affluence of operations, primarily driven by Google Play Store and third- party sources of operations. The primary distribution of the licit operation and bad operations occurs through Android Package Kit (APK) train that’s the pack of the law of an operation, its coffers and its overload. The possibility to identify malware in APK lines has, in its turn, turned into a exploration issue of cybersecurity. This abstract reviews the complexity of malware discovery ways of Android, which is substantially prone to APK train analysis, and challenges of arising malware technologies and necessity to use arising technologies and enhanced styles similar as machine literacy, deep literacy, and static and dynamic analysis, among others, to enhance discovery effectiveness and delicacy. Android ecosystem is designed as open system and is thus vulnerable to malware in the name of invention and availability. Android doesn’t also limit app installation to sanctioned app stores similar as unrestricted ecosystems but can be installed through colorful sources, including unofficial app stores, direct APK downloads, and is likely to get around strict vetting. Malware can be of different types like trojans, ransomware, spyware and adware, each possesses a specific vulnerability or type of stoner geste to which it’s supposed to exploit. Using trojans as an illustration, they can be used to appear as licit operations to steal precious information, and ransomware infects bias until a rescue is paid. Android Manifest.xml train, which contains authorization and apps geste description, and classes. Dex train, which contains the executable Dalvik law. These are large factors that can be examined during the discovery of malware as they’re likely to give signs of ill motives like vicious authorization access, law obfuscation or vicious API call. The standard hand-grounded styles, indeed after the original malware- detecting Android law was installed, continue to calculate on the comparison of the hand of the Android APK files with a collection of known malware autographs. These styles are veritably useful in arresting the pitfalls that have formerly been linked, but cannot be applied effectively with the case of zero- day attacks and poly- morphic malware that law- modulate to shirk discovery. In order to address these signs, experimenters have turned to the operation of the static and dynamic styles of analysis more. stationary analysis stationary analysis is the analysis of the APK train without executing it generally through decompiling it to examine the law, overload, and coffers. This has been proved to be computationally efficient and is capable of detecting malicious code such as excessive permission requests or an obfuscated code but can be bypassed by the use of code obfuscation or encryption by more advanced malware. Dynamic analysis, in its turn, is used to run the APK in a controlled environment, e.g. a sandbox or emulator, to observe how it will act in a runtime. This works well in detecting the malware programs which will not reveal their evil motive until they are executed such as those programs which exploit runtime vulnerabilities or, in a similar manner, which resort to contact command- and-control servers. Dynamic analysis is however expensive and may not be in a position to trigger malicious actions in case either the malware employs anti-emulation methods or the malware requires some user interaction.
Files
ANDROID MALWARE DETECTION FROM APK FILE.pdf
Files
(320.5 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:6634693f355db1f9d45ef3eabec32edf
|
320.5 kB | Preview Download |