New Free Tools Simplify Analysis of Android Malware

The Honeynet Project has helped create two tools aimed at making Android malware analysis simpler and free and, ultimately, help better secure the wildly popular mobile platform.

The new open-source tools were developed under the Google Summer of Code project, a program where students from around the world spend their summer breaks writing code for open-source software. Two students under the mentorship of The Honeynet Project focused on Android malware: One wrote a static analysis tool called APKInspector, and the other, a dynamic analysis system called DroidBox — both of which are aimed at giving researchers a way to easily reverse-engineer Android malware and to observe and dissect malicious Android apps.

“These two tools nicely complement each other and should really be part of one’s toolbox [who deals] with mobile malware,” says Christian Seifert, chief communications officer for The Honeynet Project. “We believe that mobile malware will flourish, and while similar to malware on the PC, [it has] some unique characteristics that will reflect themselves in unique characteristics of the malware itself.”
http://onlywire.com/r/50958331

Advertisements

About John Bertoli

I enjoy to read and write. I am an aspiring author and am interested in marketing, SEO strategies, finance, trading, and entrepreneurship. I started working at Bat Blue Corporation part-time during my senior year at Stevens Institute of Technology and continued after graduation, realizing how experienced and dedicated the Bat Blue technologists were. I serve as the Marketing Associate, in charge of writing press releases and case studies, as well as developing content for our website http://www.batblue.com. I organize exhibition events throughout the year, providing market exposure for the company and produce a daily network security newsletter sent to over 5,000 subscribers, known as The Daily Security Briefing. By utilizing Bat Blue's past achievements and current accomplishments, I strive to leverage these successes to create brand recognition and develop future opportunities for the company.
This entry was posted in Security Stories and tagged , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s