Please use this identifier to cite or link to this item:
http://localhost:8081/jspui/handle/123456789/18481Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Singh, Anubhav | - |
| dc.date.accessioned | 2025-12-17T06:10:47Z | - |
| dc.date.available | 2025-12-17T06:10:47Z | - |
| dc.date.issued | 2024-06 | - |
| dc.identifier.uri | http://localhost:8081/jspui/handle/123456789/18481 | - |
| dc.guide | Peddoju, Sateesh Kumar | en_US |
| dc.description.abstract | Android is an immensely popular operating system, used by the majority of people worldwide. Its widespread adoption, however, makes it a prime target for attackers. As technology advances, these attackers are becoming increasingly sophisticated, devising new techniques to exploit Android users. They create numerous malicious apps designed to steal data, commit identity theft, monitor users, and sometimes encrypt data to demand ransom for its recovery. This malicious activity creates a fearful environment for Android users, who become hesitant to install new applications due to the risk of critical data being compromised. To combat this, various methods have been developed to identify malicious apps. Traditional approaches include signature-based detection, which relies on recognizing known malware signatures, and pattern-based analysis, which looks for suspicious patterns in-app behaviour. While these methods have their merits, they also have limitations. Signature-based detection can be easily bypassed by new malware variants that do not match existing signatures. Pattern-based analysis may struggle with novel threats that do not conform to known patterns. The dynamic analysis approach is impractical for screening large numbers of applications, especially given the rapid growth of the Android app ecosystem. As the population increases and the number of apps continues to surge, relying solely on dynamic analysis will become increasingly challenging. To address these limitations, there is an urgent need for new approaches that are both fast and efficient. Advanced methodologies such as machine learning and deep learning show great promise in this regard. The goal is to develop a robust and efficient security framework that not only detects existing threats but also adapts to emerging ones. By integrating advanced technological solutions and refining detection strategies, we can create a more resilient Android ecosystem. This will ensure that users can enjoy the benefits of their devices without compromising on security, restoring their confidence in installing and using new applications. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | IIT, Roorkee | en_US |
| dc.title | BINARY IMAGE BASED STATIC ANDROID MALWARE DETECTION USING DEEP LEARNING | en_US |
| dc.type | Dissertations | en_US |
| Appears in Collections: | MASTERS' THESES (CSE) | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 22535005_ANUBHAV SINGH.pdf | 1.18 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
