Malicious code hiding android APP's distribution and hacking attacks and incident analysis

The personal information protection law enforcement by smart phone or tablet PC that is used in business for app breaches by hackers is the need to study. In this paper, hackers, malicious code to android app secreted into the black market are free to study the process of deploying. In addition, android smart phone of the app to steal important information from the user's running to be studied in the incident occurs. Malicious code analysis and source of secreted app, app is stored as it runs hack to steal user's sensitive information and security measures analysis process is presented. Through this study, a safe and secure with enhanced android smart phone and tablet PC to use will contribute.

[1]  Patrick D. McDaniel,et al.  Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.

[2]  Florian Michahelles,et al.  Detection of Malicious Applications on Android OS , 2010, ICWF.