-
Notifications
You must be signed in to change notification settings - Fork 0
Snehallaldas/Detection-of-Android-Malware-based-on-Signature-and-Permission-Analysis
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
SANDHYA MURALI ([email protected]) ------------------------------------------------------------------------------------------ Files in this directory: SourceCode: Source code of the Android Applications 1. AndroidMalwareBasedOnSignatureAnalysis: Android application that detects stand-alone Android Malware 2. SuspectCollusionPairs: Application in Android that suspects collusion pairs between applications APK 1. AndroidMalwareBasedOnSignatureAnalysis a. ServerApplicationToDetectAndroidMalware: Server Application to keep track of Play Store application signatures b. ClientApplicationToDetectAndroidMalware: Client Application to keep get signatures of user-installed applications 2. SuspectCollusionPairs a. SuspectColludedApplications : Application to suspect malicious colluded application pairs. ------------------------------------------------------------------------------------------ #######Steps to Run the code for Android Malware based on Signature Analysis:######### 1. Open Android Studio 2. GO to the path where AndroidMalwareBasedOnSignatureAnalysis folder is saved 3. Import this project in Android Studio 4. Run ServerSocket Application 5. Run adb forward tcp:<client port> tcp:<server port> (default set to 8080) 6. Run ClientSocket Application NOTE! : For Android devices, IP address of the client and server application will be the IP addresses of the Android Device. For Emulator: Server IP address is 10.0.2.15 and client IP address is 10.0.2.2 ######Steps to Install the Application for Android Malware based on Signature Analysis:##### 1. Take two Android devices 2. Install ServerApplication on one device and start the application 3. Run adb forward tcp:<client port> tcp:<server port> (default set to 8080) 3. Install ClientApplication on another device and start the application NOTE! : For Android devices, IP address of the client and server application will be the IP addresses of the Android Device. For Emulator: Server IP address is 10.0.2.15 and client IP address is 10.0.2.2 ------------------------------------------------------------------------------------------ ######Steps to Run the code for Suspecting Collusion Pairs between Android Applications:##### 1. Open Android Studio 2. GO to the path where SuspectCollusionPairs folder is saved 3. Import this project in Android Studio 4. Run the application 5. Click on the "Start" button to launch your application ######Steps to Install the Application for Suspecting Collusion Pairs between Android Applications:##### 1. Take an Android device 2. Install SuspectColludedApplication on the device and start the application 3. Click on the "Start" button to launch your application
About
No description, website, or topics provided.
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published
Languages
- Java 100.0%