Analysis of Uapush Malware Infection using Static and Behavior Method on Android
Corresponding Author(s) : Syaifuddin Syaifuddin
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control,
Vol 3, No 1, February-2018
Abstract
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- A. Kurniawan and Y. Prayudi, “Live Forensics Technique on Zeus Malware Activities to Support Malware Forensic Investigation,” HADFEX (Hacking Digital Forensics Exposed), June 2014, Pp. 1–5, 2014.
- R. Novrianda, Y. N. Kunang, and P. H. Shaksono, “Malware Forensics Analysis in Android Platform,” 2014.
- P. Richardus and E. Indrajit, “Malware Analysis.”
- R. A. Pangestu, “Analysis of Top 3 High Level Malware Infections on Zeroaccess, Alureon.dx, and Zeus using Digital Forensics based on Volatile Memory in Windows XP and Windows 7 Operation Systems,” University of Stuttgart, No. 9560291, Pp. 2–4, 2012.
- N. Threat, I. Report, N. Security, N. Threat, and I. Laboratories, “Nokia Threat Intelligence Report,” 2016.
- Y.-H. C. Ming-yang su, Kek-Tung Fung, Yu-Hao Huang, and Ming-Zhi Kang, “Detection of Android Malware: Combined with Static Analysis and Dynamic Analysis,” IEEE, Pp. 1013–1018, 2016.
- M. F. Agung, “Basic Concept of Malware Analysis,” 2011.
- R. Adenansi and L. A. Novarina, “Malware Dynamic,” Vol. 1, Pp. 37–43, 2017.
- F. Freiling, “Practical Infeasibility of Android Smartphone Live Forensics,” Practical Infeasibility of Android Smartphone Live Forensics, 2015.
- Carbone, Richard. “Malware Memory Analysis of the IVYL Linux Rootkit: Investigating a Publicly Available Linux Rootkit Using the Volatility Memory Analysis Framework,” Defence Research and Development Canada-Valcartier Research Centre Quebec, Quebec Canada, 2015.
References
A. Kurniawan and Y. Prayudi, “Live Forensics Technique on Zeus Malware Activities to Support Malware Forensic Investigation,” HADFEX (Hacking Digital Forensics Exposed), June 2014, Pp. 1–5, 2014.
R. Novrianda, Y. N. Kunang, and P. H. Shaksono, “Malware Forensics Analysis in Android Platform,” 2014.
P. Richardus and E. Indrajit, “Malware Analysis.”
R. A. Pangestu, “Analysis of Top 3 High Level Malware Infections on Zeroaccess, Alureon.dx, and Zeus using Digital Forensics based on Volatile Memory in Windows XP and Windows 7 Operation Systems,” University of Stuttgart, No. 9560291, Pp. 2–4, 2012.
N. Threat, I. Report, N. Security, N. Threat, and I. Laboratories, “Nokia Threat Intelligence Report,” 2016.
Y.-H. C. Ming-yang su, Kek-Tung Fung, Yu-Hao Huang, and Ming-Zhi Kang, “Detection of Android Malware: Combined with Static Analysis and Dynamic Analysis,” IEEE, Pp. 1013–1018, 2016.
M. F. Agung, “Basic Concept of Malware Analysis,” 2011.
R. Adenansi and L. A. Novarina, “Malware Dynamic,” Vol. 1, Pp. 37–43, 2017.
F. Freiling, “Practical Infeasibility of Android Smartphone Live Forensics,” Practical Infeasibility of Android Smartphone Live Forensics, 2015.
Carbone, Richard. “Malware Memory Analysis of the IVYL Linux Rootkit: Investigating a Publicly Available Linux Rootkit Using the Volatility Memory Analysis Framework,” Defence Research and Development Canada-Valcartier Research Centre Quebec, Quebec Canada, 2015.