Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis

The increasing prevalence of Android devices has made them prime targets for malware attacks. These malicious programs pose a significant threat, causing financial loss through unauthorized premium-rate SMS messages and jeopardizing user privacy by stealing sensitive data like login credentials and...

Full description

Saved in:
Bibliographic Details
Main Authors: Ridho Surya Kusuma, Muhammad Dirga Purnomo Putra
Format: Article
Language:English
Published: Universitas Islam Negeri Sunan Kalijaga Yogyakarta 2025-01-01
Series:JISKA (Jurnal Informatika Sunan Kalijaga)
Subjects:
Online Access:https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4720
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The increasing prevalence of Android devices has made them prime targets for malware attacks. These malicious programs pose a significant threat, causing financial loss through unauthorized premium-rate SMS messages and jeopardizing user privacy by stealing sensitive data like login credentials and contact information. The potential for downloaded malware to further compromise the device by installing additional malicious applications is even more concerning. To combat this growing menace, researchers are actively exploring methods to identify and mitigate these threats. This study investigates the effectiveness of reverse engineering as a tool for analyzing suspicious Android applications. Reverse engineering involves meticulously disassembling the application's code, deconstructing its functionalities, and revealing its underlying mechanisms. We uncovered its malicious capabilities by applying this technique to a suspected malware-infected application. This analysis used six stages: Initialization, decompilation, static analysis, code reversing, behavioral analysis, and reporting. This research underscores the power of reverse engineering as a valuable tool for deconstructing the functionalities of Android malware. By understanding how these malicious programs operate, we can develop more robust detection and prevention methods to safeguard Android users from these evolving threats. This research successfully obtained data and information about the virus and the number of attackers. The result also involves the list of specific files that contain malware indicators, so it would be used in the future to enhance detection system.
ISSN:2527-5836
2528-0074