Investigating Goldream Behaviour Through Dynamic Analysis

Smartphones have become more popular today and along with it Android Operating system also increasing rapidly. The Android OS is very popular because of their design where it is an open source design. So, it attracts people to use it because it is more convenient and easy. However, the openness of A...

Full description

Saved in:
Bibliographic Details
Main Author: Halizah, Saad
Format: Thesis
Language:English
English
Published: 2013
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/16199/1/Investigating%20Goldream%20Behaviour%20Through%20Dynamic%20Analysis%2024%20Pages.pdf
http://eprints.utem.edu.my/id/eprint/16199/2/Investigating%20Goldream%20Behaviour%20Through%20Dynamic%20Analysis.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utem-ep.16199
record_format uketd_dc
spelling my-utem-ep.161992022-03-29T12:43:57Z Investigating Goldream Behaviour Through Dynamic Analysis 2013 Halizah, Saad T Technology (General) TK Electrical engineering. Electronics Nuclear engineering Smartphones have become more popular today and along with it Android Operating system also increasing rapidly. The Android OS is very popular because of their design where it is an open source design. So, it attracts people to use it because it is more convenient and easy. However, the openness of Android design also become it flaw because it not only attract Android user but also attacker for Android platform. Their openness design and it is easy to get their application have give advantages to attacker repackaged Android application and can upload the repackage application easily on Android market or any third party market. This brings to the increasing of android malware in the market. So, because of that reason it leads to the execution of this project where this project helps to understand how is the malware behavior and how its work especially about GoldDream malware. The method used to identify the malware behavior is by conducting a dynamic analysis technique. The behavior is being extract from the network traffic log and based on system call function. As conclusion, the behavior of GoldDream that can be identify from this research are the malware will create a database in user device which this database will log all the incoming and outgoing phone call plus with spying the incoming sms. Another behavior is it will upload the victim SIM, IMEI and IMSI information to their C&C server by embedded the information in HTTP URL. 2013 Thesis http://eprints.utem.edu.my/id/eprint/16199/ http://eprints.utem.edu.my/id/eprint/16199/1/Investigating%20Goldream%20Behaviour%20Through%20Dynamic%20Analysis%2024%20Pages.pdf text en public http://eprints.utem.edu.my/id/eprint/16199/2/Investigating%20Goldream%20Behaviour%20Through%20Dynamic%20Analysis.pdf text en validuser https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=90658 mphil masters Universiti Teknikal Malaysia Melaka Faculty Of Information And Communication Technology
institution Universiti Teknikal Malaysia Melaka
collection UTeM Repository
language English
English
topic T Technology (General)
T Technology (General)
spellingShingle T Technology (General)
T Technology (General)
Halizah, Saad
Investigating Goldream Behaviour Through Dynamic Analysis
description Smartphones have become more popular today and along with it Android Operating system also increasing rapidly. The Android OS is very popular because of their design where it is an open source design. So, it attracts people to use it because it is more convenient and easy. However, the openness of Android design also become it flaw because it not only attract Android user but also attacker for Android platform. Their openness design and it is easy to get their application have give advantages to attacker repackaged Android application and can upload the repackage application easily on Android market or any third party market. This brings to the increasing of android malware in the market. So, because of that reason it leads to the execution of this project where this project helps to understand how is the malware behavior and how its work especially about GoldDream malware. The method used to identify the malware behavior is by conducting a dynamic analysis technique. The behavior is being extract from the network traffic log and based on system call function. As conclusion, the behavior of GoldDream that can be identify from this research are the malware will create a database in user device which this database will log all the incoming and outgoing phone call plus with spying the incoming sms. Another behavior is it will upload the victim SIM, IMEI and IMSI information to their C&C server by embedded the information in HTTP URL.
format Thesis
qualification_name Master of Philosophy (M.Phil.)
qualification_level Master's degree
author Halizah, Saad
author_facet Halizah, Saad
author_sort Halizah, Saad
title Investigating Goldream Behaviour Through Dynamic Analysis
title_short Investigating Goldream Behaviour Through Dynamic Analysis
title_full Investigating Goldream Behaviour Through Dynamic Analysis
title_fullStr Investigating Goldream Behaviour Through Dynamic Analysis
title_full_unstemmed Investigating Goldream Behaviour Through Dynamic Analysis
title_sort investigating goldream behaviour through dynamic analysis
granting_institution Universiti Teknikal Malaysia Melaka
granting_department Faculty Of Information And Communication Technology
publishDate 2013
url http://eprints.utem.edu.my/id/eprint/16199/1/Investigating%20Goldream%20Behaviour%20Through%20Dynamic%20Analysis%2024%20Pages.pdf
http://eprints.utem.edu.my/id/eprint/16199/2/Investigating%20Goldream%20Behaviour%20Through%20Dynamic%20Analysis.pdf
_version_ 1747833885495918592