Machine Scientific Reverse Engineering in Quark
##plugins.themes.bootstrap3.article.main##
##article.abstract##
Android forensic reverse engineering is the process of analyzing the internal structure of Android applications and the underlying operating system to extract useful information and detect potential security threats. This involves disassembling the binary code of an Android app, identifying its components and functionalities, and uncovering any hidden or malicious activities. Forensic reverse engineering can be used to investigate a variety of security incidents, including data breaches, malware attacks, and intellectual property theft. It can help identify thesource of a security breach, determine the scope of the damage, and provide insights intothe methods and tools used by attackers .Some of the key techniques used in Android forensic reverse engineering include dynamic analysis, static analysis, and reverse engineering tools such as disassemblesand decompilers. These tools can help extract information from an Android app such as its file system, network traffic, and memory usage. Overall, Android forensic reverse engineering is an important field for enhancing the security of Android-based devices and applications, and for detecting and mitigating potential threats.In the era of smartphones, Android has become one of the most popular mobile operating systems, powering millions of devices worldwide. With the rise of mobile devices, the need for mobile security has become increasingly important. In this context, Android forensic and reverse engineering are important techniques to identify potential security risks in Android applications. Quark is a powerful tool that can be used to analyze the behavior of Android applications and identify potential vulnerabilities. This includes decompiling APK files, monitoring network traffic, and extracting data from Android devices. By using Quark in combination with other forensic tools and techniques, investigators can gain a comprehensive understanding of the behavior of Android applications and identify potential security risks. In this article, we will explore the various aspects of Android forensic and reverse engineering in the context of cybersecurity, with a focus on using Quark to analyze and extract data from Android devices.
##plugins.themes.bootstrap3.article.details##
##submission.howToCite##
##submission.citations##
Bassey Asuquo Ekanem and Jacob Meye (2021).Application of Reverse Engineering Technique in Software Forensic Analysis to Detect Infringements. Proceedings of the World Congress on Engineering. GuoJ,D.Liu,R.Zhao,Z.LiWltdroid(2020): repackaging detection approach for android applicationsInternational Conference on Web Information Systems and Applications,Springer, pp.579-591
Dalla,M., Preda,F.Maggi(2017). Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology. Journal of Computer Virology and Hacking Techniques,13,pp.209-232
RastogiV,Y.Chen,X.Jiang(2013). Droidchameleon: evaluating android anti-malware against transformation attacksProceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp.329-334Soe
Myint Myat, May Thu Kyaw. (2019). Analysis of Android Applications by Using Reverse Engineering Techniques, International Journal of Innovative Science and Research Technology, 4(3):551-558.
Wang, Y., H.Wu,H.Zhang,A.RountevOrlis (2018)obfuscation-resilient library detection for androidIEEE/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft),IEEE, pp.13-23You, I and K.Yim(2010). Malware obfuscation techniques: a brief surveyInternationalConference on Broadband, Wireless Computing, Communication and Applications,IEEE, pp.297-300.