Skip Nav Destination
ASME Press Select Proceedings
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
ISBN:
9780791859919
No. of Pages:
2000
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
50 Analysis of Malicious Applications for Symbian Smartphones
By
Zheng Song
,
Zheng Song
Key Laboratory of Information Network and Security, Ministry of Public Security,
PRC
Search for other works by this author on:
Bo Jin
,
Bo Jin
Key Laboratory of Information Network and Security, Ministry of Public Security,
PRC
Search for other works by this author on:
Jiuchuan Lin
,
Jiuchuan Lin
Key Laboratory of Information Network and Security, Ministry of Public Security,
PRC
Search for other works by this author on:
Ying Zhang
Ying Zhang
Key Laboratory of Information Network and Security, Ministry of Public Security,
PRC
Search for other works by this author on:
Page Count:
5
-
Published:2011
Citation
Song, Z, Jin, B, Lin, J, & Zhang, Y. "Analysis of Malicious Applications for Symbian Smartphones." International Conference on Computer Technology and Development, 3rd (ICCTD 2011). Ed. Zhou, J. ASME Press, 2011.
Download citation file:
This paper presents the general methods of malware analysis on Symbian smartphone platform. The technical analysis undergoes in three phases: unpack the installation file, reverse engineering statically and trace dynamically (debugging). This paper gives a case study of a sample in the wild to prove the correctness and convenience of presented methods. It summarizes the behaviors of malware observed in our investigation. The result shows our methods for analysis is suitable and practical currently. The methods we presented have been used in real cases in forensic practice.
Abstract
Key Words
1. Introduction
2. Symbian Platform
3. The Methodology
4. Case Study
5. Summary of Malicious Behaviors
6. Conclusion
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
Calculation of Injured Area in Forensic Image Based on Segmentations
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
Approach of Crime Scene Protection concerning Computer Forensics
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
Spherical SOFM: Implications for Forensics and Craniofacial Surgery
Intelligent Engineering Systems through Artificial Neural Networks
Attack Graphs with Anti-Forensics Tool - in Forensics Examination
International Conference on Computer Research and Development, 5th (ICCRD 2013)
Related Articles
Working Backward
Mechanical Engineering (June,2005)
A Complementary Sensor Approach to Reverse Engineering
J. Manuf. Sci. Eng (February,2001)
Finding Approximate Shape Regularities for Reverse Engineering
J. Comput. Inf. Sci. Eng (December,2001)