Argumentative Essay Sandbox

1355 Words6 Pages

Critical Analysis
Mobile-Sandbox: Having a Deeper Look into Android Applications

Udara Somachandra – MS14961090

1. INTRODUCTION

In the present day a mobile phones are not a just device that you can make a call. The mobile phone has become smarter and it’s gradually gaining fame, forming new application areas as their abilities increase in terms of computational power, sensors and communication. Hence in recent years smartphone sales has tremendously increased. This evolution has drawn attention of criminals, thus criminals build numerous malicious application to attract users to install same on the device.
Criminals spread these malicious application via common smartphone application markets. Malicious application can be viruses, worms, …show more content…

As the applications must declare what privileges it necessitates, the user can make a knowledgeable decision at the time of installation. Everything above the kernel level runs within their own individual sandboxes. Even within the operating system level, the security of the Linux kernel is provided combined with secure inter-process communication. This means that even the native code is constrained to the application sandbox.

2.2 State-of-the-art sources review
In order to make research topic effective, researchers does the literature review on topics of; Android operating system, current threat landscape in mobile devices for malware on Android platform, illustrate the framework and explains the idea behind static and dynamic analysis and present the results of evaluation.
Furthermore with a specific end goal to make Mobile-Sandbox application viable, the researchers utilized 40,000 haphazardly selected applications from important Asian markets and from Google Play including 7500 malicious examples from various malicious families, and Mobile-Sandbox was able to identify 4,641 malicious applications and 5 suspicious specimen which attempt to conceal their malicious activity inside the native code.

2.3 Key points deliberated and guidance of them
In the literature review researchers stated about following …show more content…

To start with, they perform a few against infection filters utilizing the infection absolute administration, also, researchers parse the show record, and lastly they decompile the application to better recognize suspicious code. Inside of the dynamic analysis, they execute the application in an emulator and log each operation of the application, i.e., log both the activities executed in the Java Virtual Machine Dalvik and activities executed in local libraries which might be packaged with the application. To be best of their insight, Mobile-Sandbox is the main examination structure for the Android stage which has this capacity.

3. METHODOLOGY

3.1 Is the approach clearly stated?
As the objective is to build an application to detect malicious activity in Android Applications. A framework intended to consequently dissect Android applications in two novel ways: [1] it consolidates static and dynamic analysis, i.e., consequences of static investigation are utilized to guide dynamic investigation and augment scope of executed code, and [2] it utilizes particular procedures to log calls to native APIs.

3.2 Are the methods clearly explained and justified?
First researchers discussed about static analysis, the results of it are used to guide dynamic analysis.
In static analysis, to gain a first impression of the application that ought to be broke

Open Document