of ShophosLabs reported that more and more malicious apps are being developed with the frameworks. In Q1 2016, 34% of top 1000 free mobile games are developed and around 2.4 billion unique mobile devices have been running Unity-made games.Īdversaries also utilise the frameworks to make their malware spreadable easily while minimizing malware development cost and time. According to the report from Unity Technologies, Unity currently supports 28 different platforms and touches 770 million gamers all over the world through games made using the engine. Such frameworks include Unity, Xamarin, Appcelerator Titanium, PhoneGap, Sencha, and Cocos2d.Īmong the frameworks, Unity (commonly known as Unit圓D) is a very popular cross-platform framework for mobile app development. The frameworks reduce development and maintenance costs. These development frameworks employ the “ write code once, run on multiple platforms” feature: the frameworks translate codes for one platform to another platform and provide rum-time library supporting app execution. Several cross-platform development frameworks have emerged to tackle these challenges. The development and maintenance cost increases. Developers cannot reuse the source codes of one platform for another platform and must write codes multiple times. Developers need to know in-depth knowledge of each platform, dedicated software development kits (SDKs), and different programming language. Developing an app for each platform has disadvantages. A native app is an application built to run only on a certain mobile platform. Because these mobile platforms use different development frameworks, app developers who want to cover many users need to develop their native apps for each platform. The smartphone market is currently dominated by various mobile platforms such as Android, iOS, Windows Phone, and BlackBerry OS. Using the proposed techniques, the malware analyst can statically and dynamically analyse Java code, native code in C or C ++, and the Mono runtime layer where the C# code is running. Then, we also propose a systematic technique to analyse dynamically the Unity app. We first inspect the executable file format of a Unity app and present an effective static analysis technique of the Unity app. We propose static and dynamic reverse engineering techniques for malicious Unity apps. Even though malicious apps were discovered among Android apps written with Unity framework (Unity apps), little research has been done on analysing the malicious apps. While Unity developers can easily develop mobile apps for multiple platforms, adversaries can also easily build malicious apps based on the “ write once, run anywhere” (WORA) feature. Keywords: Malware Detection, Static Analysis, Android Applications, Signature-based, Permission-based.Unity is the most popular cross-platform development framework to develop games for multiple platforms such as Android, iOS, and Windows Mobile. However, it is encouraged to provide novel ideas that can help in developing innovative solutions and intelligent systems for detecting various malware in our digital world. We, then, provides a literature review on some research works that have been introduced in the last few years on static analysis of Android malware, for both signature-based and the permission-based approaches. We initially investigate common types of malware and present the main categories of malware analysis methods. In this context, this paper provides a progress study for static analysis of malware in Android-based platforms. Such static analysis based schemes are commonly utilized in anti-virus software, including the signature-based and the permission-based mechanisms. Some of these techniques focus on static analysis by inspecting the application package to discover any suspicious hidden code. Several research works have been conducted on this issue and numerous techniques have been developed for detecting malware. This keeps users' data and credentials on hazards and makes them vulnerable to attackers. Abstract : Android-based platforms enable various applications to request and gain permissions when they need to access the resources of our mobile-phones.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |