Malware Bytes – Advanced Fault Analysis

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 3 | Mar -2017

www.irjet.net

e-ISSN: 2395 -0056 p-ISSN: 2395-0072

MALWARE BYTES – ADVANCED FAULT ANALYSIS Shanmathi.T[1], Shravya.R[2], Sneha.M[3],Anitha Moses[4] [1],[2],[3]Student of Computer Science and Engineering Department, Panimalar Engineering College [4]Associate Professor of Computer Science and Engineering Department, Panimalar Engineering College -------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Abstract-The quick development of smart phones has

advertising. Before the term malware, malicious software was referred to as computer viruses. Malware is intended to steal information or spy on computer users for an extended period without their knowledge. Spyware or other malware is sometimes found embedded in programs supplied officially by companies, e.g., downloadable from websites, that appear useful or attractive, but may have hidden tracking functionality that gathers various user details. Software such as anti-virus and firewalls are used to protect against activity identified as malicious, and to recover from attacks.

come as an inseparable unit with a comparative increment in the number and advancement of malignant programming focusing on these stages. Malware examination is a flourishing exploration zone with a significant measure of still unsolved issues. A critical source of security issues is the capacity to merge third-party applications from accessible online markets. On account of advanced smart phones, the noteworthy development both in malware and friendly applications is making progressively unreasonably expensive any human-driven analysis of possibly risky applications. Malware sample comprising of hidden and unclear modules containing vicious components that static examination tools disregard. ALTERDROID, is an open source tool for analyzing, through reverse engineering, unclear components conveyed as parts of an application bundle. Such segments are a portion of a vicious application and are covered up outside its fundamental code segments, as code parts might be accountable to static investigation by market operators. The Malware applications are displayed on the screen, and later the authorized user can uninstall the malicious application. When the same is attempted by the unauthorized user the capture module is triggered. The quality and viability of the application is enhanced by testing ALTERDROID over the relevant applications and malware samples.

1.1 LITERATURE SURVEY The signatures that should detect the confirmed malicious threats are still mainly created manually, it is important to discriminate between samples that pose a new unknown threat, and those that are mere variants of known malware [2]. a class of smartphone malware that uses steganographic techniques to hide malicious executable components within their assets, such as documents, databases, or multimedia files[8]. The fundamental deficiency in the pattern-matching approach to malware detection is that it is purely syntactic and ignores the semantics of instructions. In this paper, malware detection algorithm addresses this deficiency by incorporating instruction semantics to detect malicious program traits[4]. a lightweight method for detection of Android malware that enables identifying malicious applications directly on the smartphone[1].A system that addresses this problem by relying on stochastic models of usage and context events derived from real user traces[13].

Key Words: ALTERDROID, Malware, Computing.

1 INTRODUCTION A smartphone is a mobile phone with an advanced mobile operating system that combines features of a personal computer operating system with other features useful for mobile or handheld use. Smartphones, which are pocketsized. Smartphones can access the Internet and can run a variety of third-party software components ("apps" from places like Google PlayStore ). They typically have a color display with a graphical user interface that covers more than 76% of the front surface. Malware, short for malicious software, is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted

Š 2017, IRJET

|

Impact Factor value: 5.181

1.2 NEED OF THE PROJECT Malware may be anything from a virus that crashes your system to an Adware program that flashes unwanted ads or pop-ups on your screen. Other times, malware may be a Spyware program that transmits information about your computing and Internet practices to a remote user. The first category of malware propagation concerns parasitic software fragments that attach themselves to some existing executable content. The fragment may be machine

|

ISO 9001:2008 Certified Journal

|

Page 750


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.