Skip to content

Snehallaldas/Detection-of-Android-Malware-based-on-Signature-and-Permission-Analysis

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 

Repository files navigation

SANDHYA MURALI ([email protected])
------------------------------------------------------------------------------------------
Files in this directory:

SourceCode: Source code of the Android Applications

1. AndroidMalwareBasedOnSignatureAnalysis:  Android application that detects stand-alone Android Malware
2. SuspectCollusionPairs: Application in Android that suspects collusion pairs between applications

APK

1. AndroidMalwareBasedOnSignatureAnalysis
	a. ServerApplicationToDetectAndroidMalware: Server Application to keep track of Play Store application signatures
	b. ClientApplicationToDetectAndroidMalware: Client Application to keep get signatures of user-installed applications

2. SuspectCollusionPairs
	a. SuspectColludedApplications : Application to suspect malicious colluded application pairs.

------------------------------------------------------------------------------------------

#######Steps to Run the code for Android Malware based on Signature Analysis:#########

1. Open Android Studio
2. GO to the path where AndroidMalwareBasedOnSignatureAnalysis folder is saved
3. Import this project in Android Studio
4. Run ServerSocket Application
5. Run adb forward tcp:<client port> tcp:<server port> (default set to 8080)
6. Run ClientSocket Application

NOTE! : For Android devices, IP address of the client and server application will be the IP addresses of the Android Device.
	For Emulator: Server IP address is 10.0.2.15 and client IP address is 10.0.2.2


######Steps to Install the Application for Android Malware based on Signature Analysis:#####

1. Take two Android devices
2. Install ServerApplication on one device and start the application
3. Run adb forward tcp:<client port> tcp:<server port> (default set to 8080)
3. Install ClientApplication on another device and start the application

NOTE! : For Android devices, IP address of the client and server application will be the IP addresses of the Android Device.
		For Emulator: Server IP address is 10.0.2.15 and client IP address is 10.0.2.2

------------------------------------------------------------------------------------------


######Steps to Run the code for Suspecting Collusion Pairs between Android Applications:#####

1. Open Android Studio
2. GO to the path where SuspectCollusionPairs folder is saved
3. Import this project in Android Studio
4. Run the application
5. Click on the "Start" button to launch your application


######Steps to Install the Application for Suspecting Collusion Pairs between Android Applications:#####

1. Take an Android device
2. Install SuspectColludedApplication on the device and start the application
3. Click on the "Start" button to launch your application



About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Java 100.0%