WICAKSONO, INDRA and Stiawan, Deris and Afifah, Nurul (2024) DETEKSI MALWARE ANDROID DENGAN METODE REVERSE ENGINEERING. Undergraduate thesis, Sriwijaya University.
Text
RAMA_56201_09011382025128.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (5MB) | Request a copy |
|
Text
RAMA_56201_09011382025128_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (3MB) | Request a copy |
|
Text
RAMA_56201_09011382025128_0003047905_8958340022_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (777kB) |
|
Text
RAMA_56201_09011382025128_0003047905_8958340022_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (53kB) | Request a copy |
|
Text
RAMA_56201_09011382025128_0003047905_8958340022_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (68kB) | Request a copy |
|
Text
RAMA_56201_09011382025128_0003047905_8958340022_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (4MB) | Request a copy |
|
Text
RAMA_56201_09011382025128_0003047905_8958340022_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (7kB) | Request a copy |
|
Text
RAMA_56201_09011382025128_0003047905_8958340022_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (77kB) | Request a copy |
|
Text
RAMA_56201_09011382025128_0003047905_8958340022_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (537kB) | Request a copy |
Abstract
Smartphones used by everyone are connected to the internet at all times. A user is unaware of how much data they store and display while using various applications. With the increasing number of Android users over time, Android has become a target for cybercriminals, leading to an increase in malware attacks on these devices. Reverse engineering is the most crucial approach in analyzing malware; this technique can extract comprehensive information needed to analyze the logic flow of the application. This study will perform reverse engineering and validate it with dynamic analysis using an Android emulator on several samples from the public malware repository Malware Bazaar. The research results show that malware often disguises itself as useful or normal applications to deceive users. Furthermore, malware requests several permissions from the system that should not be required by the application. These permissions are typically exploited to steal, alter, and even delete sensitive data, as well as to spy on users.
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Malware Android, Reverse Engineering |
Subjects: | T Technology > T Technology (General) > T57.6-57.97 Operations research. Systems analysis > T57.85 Network systems theory Including network analysis Cf. TS157.5+ Scheduling |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Indra Wicaksono |
Date Deposited: | 25 Jul 2024 03:59 |
Last Modified: | 25 Jul 2024 03:59 |
URI: | http://repository.unsri.ac.id/id/eprint/153149 |
Actions (login required)
View Item |