Abstract
Android is the most commonly used mobile device operating system. Due to the biggest mobile market, attract many hackers to develop malware to exploit users. Regarding to overcome this problem, developing a trustworthy and fast malware analysis method is necessary. In addition, there are limited resources for mobile devices to test applications. Frida , which is free and open source dynamic code instrumentation toolkit that works by injecting a JavaScript engine (Duktape and V8) into the target projects. Besides, Frida lets us execute snippets of JavaScript into native apps on multiple platforms such as Android and iOS. In this project, we can use frida by implements code injection which is writing code directly into process memory. Then, JS gets executed with full access to memory, hooking functions and even calling native functions inside the process.
Metadata
Item Type: | Thesis (Degree) |
---|---|
Creators: | Creators Email / ID Num. Amaran, Rosamira 2017283162 |
Contributors: | Contribution Name Email / ID Num. Thesis advisor Othman, Hamid UNSPECIFIED |
Subjects: | T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunication > Wireless communication systems. Mobile communication systems. Access control |
Divisions: | Universiti Teknologi MARA, Shah Alam > Faculty of Computer and Mathematical Sciences |
Programme: | Bachelor of Science (Hons.) Data Communication and Networking |
Keywords: | Android application, mobile market, malware |
Date: | 2020 |
URI: | https://ir.uitm.edu.my/id/eprint/107920 |
Download
![[thumbnail of 107920.pdf]](https://ir.uitm.edu.my/style/images/fileicons/text.png)
107920.pdf
Download (146kB)
Digital Copy

Physical Copy
ID Number
107920
Indexing

