Skip to content
An Android operating system for mobile phones and Personal Digital Assistant (PDA) devices has become increasingly popular due to its incredible features. These feature-based applications help the users to perform their day-to-day tasks with ease and comfort. Though these featured applications increase the demand for Android devices, a large num…
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
APK
SourceCode
README.txt First Commit Dec 10, 2018

README.txt

SANDHYA MURALI (sm2290@g.rit.edu)
------------------------------------------------------------------------------------------
Files in this directory:

SourceCode: Source code of the Android Applications

1. AndroidMalwareBasedOnSignatureAnalysis:  Android application that detects stand-alone Android Malware
2. SuspectCollusionPairs: Application in Android that suspects collusion pairs between applications

APK

1. AndroidMalwareBasedOnSignatureAnalysis
	a. ServerApplicationToDetectAndroidMalware: Server Application to keep track of Play Store application signatures
	b. ClientApplicationToDetectAndroidMalware: Client Application to keep get signatures of user-installed applications

2. SuspectCollusionPairs
	a. SuspectColludedApplications : Application to suspect malicious colluded application pairs.

------------------------------------------------------------------------------------------

#######Steps to Run the code for Android Malware based on Signature Analysis:#########

1. Open Android Studio
2. GO to the path where AndroidMalwareBasedOnSignatureAnalysis folder is saved
3. Import this project in Android Studio
4. Run ServerSocket Application
5. Run adb forward tcp:<client port> tcp:<server port> (default set to 8080)
6. Run ClientSocket Application

NOTE! : For Android devices, IP address of the client and server application will be the IP addresses of the Android Device.
	For Emulator: Server IP address is 10.0.2.15 and client IP address is 10.0.2.2


######Steps to Install the Application for Android Malware based on Signature Analysis:#####

1. Take two Android devices
2. Install ServerApplication on one device and start the application
3. Run adb forward tcp:<client port> tcp:<server port> (default set to 8080)
3. Install ClientApplication on another device and start the application

NOTE! : For Android devices, IP address of the client and server application will be the IP addresses of the Android Device.
		For Emulator: Server IP address is 10.0.2.15 and client IP address is 10.0.2.2

------------------------------------------------------------------------------------------


######Steps to Run the code for Suspecting Collusion Pairs between Android Applications:#####

1. Open Android Studio
2. GO to the path where SuspectCollusionPairs folder is saved
3. Import this project in Android Studio
4. Run the application
5. Click on the "Start" button to launch your application


######Steps to Install the Application for Suspecting Collusion Pairs between Android Applications:#####

1. Take an Android device
2. Install SuspectColludedApplication on the device and start the application
3. Click on the "Start" button to launch your application



You can’t perform that action at this time.