Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis

The increasing prevalence of Android devices has made them prime targets for malware attacks. These malicious programs pose a significant threat, causing financial loss through unauthorized premium-rate SMS messages and jeopardizing user privacy by stealing sensitive data like login credentials and...

Full description

Saved in:
Bibliographic Details
Main Authors: Ridho Surya Kusuma, Muhammad Dirga Purnomo Putra
Format: Article
Language:English
Published: Universitas Islam Negeri Sunan Kalijaga Yogyakarta 2025-01-01
Series:JISKA (Jurnal Informatika Sunan Kalijaga)
Subjects:
Online Access:https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4720
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832574169618841600
author Ridho Surya Kusuma
Muhammad Dirga Purnomo Putra
author_facet Ridho Surya Kusuma
Muhammad Dirga Purnomo Putra
author_sort Ridho Surya Kusuma
collection DOAJ
description The increasing prevalence of Android devices has made them prime targets for malware attacks. These malicious programs pose a significant threat, causing financial loss through unauthorized premium-rate SMS messages and jeopardizing user privacy by stealing sensitive data like login credentials and contact information. The potential for downloaded malware to further compromise the device by installing additional malicious applications is even more concerning. To combat this growing menace, researchers are actively exploring methods to identify and mitigate these threats. This study investigates the effectiveness of reverse engineering as a tool for analyzing suspicious Android applications. Reverse engineering involves meticulously disassembling the application's code, deconstructing its functionalities, and revealing its underlying mechanisms. We uncovered its malicious capabilities by applying this technique to a suspected malware-infected application. This analysis used six stages: Initialization, decompilation, static analysis, code reversing, behavioral analysis, and reporting. This research underscores the power of reverse engineering as a valuable tool for deconstructing the functionalities of Android malware. By understanding how these malicious programs operate, we can develop more robust detection and prevention methods to safeguard Android users from these evolving threats. This research successfully obtained data and information about the virus and the number of attackers. The result also involves the list of specific files that contain malware indicators, so it would be used in the future to enhance detection system.
format Article
id doaj-art-73bc4a38591b4cdaacee18b133bca0a4
institution Kabale University
issn 2527-5836
2528-0074
language English
publishDate 2025-01-01
publisher Universitas Islam Negeri Sunan Kalijaga Yogyakarta
record_format Article
series JISKA (Jurnal Informatika Sunan Kalijaga)
spelling doaj-art-73bc4a38591b4cdaacee18b133bca0a42025-02-02T00:37:11ZengUniversitas Islam Negeri Sunan Kalijaga YogyakartaJISKA (Jurnal Informatika Sunan Kalijaga)2527-58362528-00742025-01-01101Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis Ridho Surya Kusuma0Muhammad Dirga Purnomo Putra 1Universitas Siber MuhammadiyahUniversitas Siber Muhammadiyah The increasing prevalence of Android devices has made them prime targets for malware attacks. These malicious programs pose a significant threat, causing financial loss through unauthorized premium-rate SMS messages and jeopardizing user privacy by stealing sensitive data like login credentials and contact information. The potential for downloaded malware to further compromise the device by installing additional malicious applications is even more concerning. To combat this growing menace, researchers are actively exploring methods to identify and mitigate these threats. This study investigates the effectiveness of reverse engineering as a tool for analyzing suspicious Android applications. Reverse engineering involves meticulously disassembling the application's code, deconstructing its functionalities, and revealing its underlying mechanisms. We uncovered its malicious capabilities by applying this technique to a suspected malware-infected application. This analysis used six stages: Initialization, decompilation, static analysis, code reversing, behavioral analysis, and reporting. This research underscores the power of reverse engineering as a valuable tool for deconstructing the functionalities of Android malware. By understanding how these malicious programs operate, we can develop more robust detection and prevention methods to safeguard Android users from these evolving threats. This research successfully obtained data and information about the virus and the number of attackers. The result also involves the list of specific files that contain malware indicators, so it would be used in the future to enhance detection system. https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4720Malware AndroidReverse EngineeringAndroid SecurityDigital ForensicCybersecurity
spellingShingle Ridho Surya Kusuma
Muhammad Dirga Purnomo Putra
Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
JISKA (Jurnal Informatika Sunan Kalijaga)
Malware Android
Reverse Engineering
Android Security
Digital Forensic
Cybersecurity
title Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
title_full Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
title_fullStr Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
title_full_unstemmed Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
title_short Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
title_sort android malware threats a strengthened reverse engineering approach to forensic analysis
topic Malware Android
Reverse Engineering
Android Security
Digital Forensic
Cybersecurity
url https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4720
work_keys_str_mv AT ridhosuryakusuma androidmalwarethreatsastrengthenedreverseengineeringapproachtoforensicanalysis
AT muhammaddirgapurnomoputra androidmalwarethreatsastrengthenedreverseengineeringapproachtoforensicanalysis