Machine Scientific Reverse Engineering in Quark

Main Article Content

Anas Jamwal

Abstract

Android forensic reverse engineering is the process of analyzing the internal structure of Android applications  and  the  underlying  operating  system  to  extract  useful  information  and  detect potential  security  threats.  This  involves  disassembling  the  binary  code  of  an  Android  app, identifying   its   components   and functionalities,   and   uncovering   any   hidden   or   malicious activities. Forensic reverse engineering can be used to investigate a variety of security incidents, including data breaches, malware attacks, and intellectual property theft. It can help identify thesource  of  a  security  breach,  determine  the  scope  of  the  damage,  and  provide  insights  intothe methods  and  tools  used  by  attackers  .Some  of  the  key  techniques  used  in  Android  forensic reverse engineering include dynamic analysis, static analysis, and reverse engineering tools such as disassemblesand decompilers. These tools can help extract information from an Android app such  as  its  file  system,  network  traffic,  and  memory  usage.  Overall,  Android  forensic  reverse engineering  is  an  important  field  for  enhancing  the  security  of  Android-based  devices  and applications,  and  for  detecting  and  mitigating  potential  threats.In  the  era  of  smartphones, Android  has  become  one  of  the  most  popular  mobile  operating  systems,  powering  millions  of devices  worldwide.  With  the  rise  of  mobile  devices,  the  need  for  mobile  security  has  become increasingly  important.  In  this  context,  Android  forensic  and  reverse  engineering  are  important techniques  to  identify  potential  security  risks  in  Android  applications.  Quark  is  a  powerful tool that  can  be  used  to  analyze  the  behavior  of  Android  applications  and  identify  potential vulnerabilities. This includes decompiling APK files, monitoring network traffic, and extracting data  from  Android  devices.  By  using  Quark  in  combination  with  other  forensic  tools  and techniques,  investigators  can  gain  a  comprehensive  understanding  of  the  behavior  of  Android applications  and  identify  potential  security  risks.  In  this  article,  we  will  explore  the  various aspects of Android forensic and reverse engineering in the context of cybersecurity, with a focus on using Quark to analyze and extract data from Android devices.

Article Details

How to Cite
Jamwal, A. (2023). Machine Scientific Reverse Engineering in Quark. Zhongguo Kuangye Daxue Xuebao, 28(2), 1-3. https://zkdx.ch/journal/zkdx/article/view/24
Section
Articles

How to Cite

Jamwal, A. (2023). Machine Scientific Reverse Engineering in Quark. Zhongguo Kuangye Daxue Xuebao, 28(2), 1-3. https://zkdx.ch/journal/zkdx/article/view/24

References

Bassey Asuquo Ekanem and Jacob Meye (2021).Application of Reverse Engineering Technique in Software Forensic Analysis to Detect Infringements. Proceedings of the World Congress on Engineering. GuoJ,D.Liu,R.Zhao,Z.LiWltdroid(2020): repackaging detection approach for android applicationsInternational Conference on Web Information Systems and Applications,Springer, pp.579-591

Dalla,M., Preda,F.Maggi(2017). Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology. Journal of Computer Virology and Hacking Techniques,13,pp.209-232

RastogiV,Y.Chen,X.Jiang(2013). Droidchameleon: evaluating android anti-malware against transformation attacksProceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp.329-334Soe

Myint Myat, May Thu Kyaw. (2019). Analysis of Android Applications by Using Reverse Engineering Techniques, International Journal of Innovative Science and Research Technology, 4(3):551-558.

Wang, Y., H.Wu,H.Zhang,A.RountevOrlis (2018)obfuscation-resilient library detection for androidIEEE/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft),IEEE, pp.13-23You, I and K.Yim(2010). Malware obfuscation techniques: a brief surveyInternationalConference on Broadband, Wireless Computing, Communication and Applications,IEEE, pp.297-300.

Similar Articles

You may also start an advanced similarity search for this article.