Nguyen Tieu Phuong Student ID: 20210692
This repository contains the results and research work done as part of the Graduation Research 2 project at Hanoi University of Science and Technology. The project focuses on Android malware analysis, specifically static analysis of Android APK files using various tools and techniques.
The goal of this research is to explore and develop methods for identifying malicious behavior in Android applications by performing static analysis. The analysis includes the use of tools such as Androguard to disassemble, decompile, and examine the structure of APK files.
- Static analysis of Android malware
- Identification of malicious code and behavior patterns in Android applications
- Development of a toolchain for analyzing APK files
- Techniques for overcoming obfuscation and anti-reverse engineering measures in Android apps
- Androguard: An open-source tool for analyzing Android applications, providing capabilities like disassembly, decompilation, and static analysis.
- JADX: A decompiler for Android APK files, converting them into Java code.
- APKTool: A tool for reverse engineering Android APK files and decoding resources to their original form.
- Ghidra: Used for generating graphs from APKs.
figures/
: Contains images and graphs used in the report.graphs/
: Contains data visualizations and analysis results.report/
: Contains the project report.
Feel free to fork the repository, raise issues, or submit pull requests. Contributions are welcome.
This project is licensed under the MIT License - see the LICENSE file for details.
Prof. Tran Quang Duc and Prof. Truong Thi Dieu Linh for their supervision.
The authors of the tools and libraries used in this project.
The authors of the references listed in the report for their valuable contributions to the field of malware analysis.
For more detailed explanations and findings, please refer to the full report in the report/
directory.