Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/74205
Title: | Automatic removal of malicious code fragments from infected host software | Authors: | Chan, Jeremy Mun Jung | Keywords: | DRNTU::Engineering::Computer science and engineering | Issue Date: | 2018 | Abstract: | At a time when mobile security is of paramount importance, this project aims to investigate how, instead of quarantining malware samples upon detection, modifications to the application can be made such that only the malicious sections of the application’s code are removed. By analysing the malware and removing the malicious section, the application will hence be safe to use. Firstly, the project examines how malware runs and steals information on Android Operating Systems. Using the results of this analysis, the project then develops a program named AndroidMalwareModifier, which aids in the cleaning of suspicious applications and the subsequent removal of the malicious sections of the code. AndroidMalwareModifier thus leaves the application’s main functionalities intact and runnable, removing any traces of the malicious code. This report also summarizes the test results of using AndroidMalwareModifier to analyse a malware dataset provided by the Android Malware Genome Project. The test results also showed the efficiency of AndroidMalwareModifier on the malware dataset, where 74% of the malware samples tested were successfully modified. The other 26% failed the modification due to outlying exploits not covered by AndroidMalwareModifier, such as malware that aims to bloat devices rather than stealing information. Lastly, this project explains the technical process of removing the malicious code from these applications in hopes that further research can be conducted to allow AndroidMalwareModifier to modify and clean several new malware types that may appear in the future. | URI: | http://hdl.handle.net/10356/74205 | Schools: | School of Computer Science and Engineering | Rights: | Nanyang Technological University | Fulltext Permission: | restricted | Fulltext Availability: | With Fulltext |
Appears in Collections: | SCSE Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
SCE17-0242 AMENDED FINAL YEAR PROJECT REPORT.pdf Restricted Access | 2.26 MB | Adobe PDF | View/Open |
Page view(s)
368
Updated on Mar 16, 2025
Download(s) 50
21
Updated on Mar 16, 2025
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.