Claim Missing Document
Check
Articles

Found 1 Documents
Search

Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis Kusuma, Ridho Surya; Putra , Muhammad Dirga Purnomo
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 10 No. 1 (2025): January 2025
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2025.10.1.122-138

Abstract

The widespread adoption of Android devices has rendered them a primary target for malware attacks, resulting in substantial financial losses and significant breaches of user privacy. Malware can exploit system vulnerabilities to execute unauthorized premium SMS transactions, exfiltrate sensitive data, and install additional malicious applications. Conventional detection methodologies, such as static and dynamic analysis, often prove inadequate in identifying deeply embedded malicious behaviors. This study introduces a systematic reverse engineering framework for analysing suspicious Android applications. In contrast to traditional approaches, the proposed methodology comprises six distinct stages: initialization, decompilation, static analysis, code reversal, behavioral analysis, and reporting. This structured process facilitates a comprehensive examination of an application’s internal mechanisms, enabling the identification of concealed malware functionalities. The findings of this study demonstrate that the proposed method attains an overall effectiveness of 84.3%, surpassing conventional static and dynamic analysis techniques. Furthermore, this research generates a detailed list of files containing specific malware indicators, thereby enhancing the effectiveness of future malware detection and prevention systems. These results underscore the efficacy of reverse engineering as a critical tool for understanding and mitigating sophisticated Android malware threats.