{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:27Z","timestamp":1740141807062,"version":"3.37.3"},"reference-count":19,"publisher":"SAGE Publications","issue":"9","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["13-912-06-003","IITP-2015-H8501-15-1008"],"award-info":[{"award-number":["13-912-06-003","IITP-2015-H8501-15-1008"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Information Technology Research Center","award":["13-912-06-003","IITP-2015-H8501-15-1008"],"award-info":[{"award-number":["13-912-06-003","IITP-2015-H8501-15-1008"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,9,1]]},"abstract":"<jats:p> We suggest an idea to dump executable code from memory for malicious application analysis on Android platform. Malicious applications are getting enhanced in terms of antianalysis techniques. Recently, sophisticated malicious applications have been found, which are not decompiled and debugged by existing analysis tools. It becomes serious threat to services related to embedded devices based on Android. Thus, we have implemented the idea to obtain main code from the memory by modifying a part of Dalvik Virtual Machine of Android. As a result, we have confirmed that the executable code is completely obtainable. In this paper, we introduce the existing analysis techniques for Android application, and antianalysis techniques. We then describe the proposed method with a sample malicious application which has strong antianalysis techniques. <\/jats:p>","DOI":"10.1155\/2015\/379682","type":"journal-article","created":{"date-parts":[[2015,9,27]],"date-time":"2015-09-27T21:02:27Z","timestamp":1443387747000},"page":"379682","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":13,"title":["DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis"],"prefix":"10.1177","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2268-8315","authenticated-orcid":false,"given":"Dongwoo","family":"Kim","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Chungnam National University, Daejeon 305-764, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6931-2705","authenticated-orcid":false,"given":"Jin","family":"Kwak","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Engineering, Ajou University, Suwon 443-749, Republic of Korea"}]},{"given":"Jaecheol","family":"Ryou","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Chungnam National University, Daejeon 305-764, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2015,9,27]]},"reference":[{"first-page":"95","volume-title":"Proceedings of the 11th International Conference on Telecommunications (ConTEL \u201811)","author":"Kuna M.","key":"B1-2015-379682"},{"key":"B2-2015-379682","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/532568"},{"key":"B3-2015-379682","doi-asserted-by":"publisher","DOI":"10.1145\/2557977.2557979"},{"key":"B4-2015-379682","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/983901"},{"key":"B5-2015-379682","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-4249-9"},{"first-page":"107","volume-title":"Proceedings of the International Conference on Computer Applications and Information Processing Technology","author":"Piao Y.","key":"B6-2015-379682"},{"key":"B7-2015-379682","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2013.44024"},{"key":"B8-2015-379682","doi-asserted-by":"publisher","DOI":"10.1145\/2494522"},{"key":"B9-2015-379682","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_21"},{"key":"B10-2015-379682","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/262193"},{"key":"B11-2015-379682","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"B12-2015-379682","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.4.715-722"},{"key":"B13-2015-379682","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/101986"},{"key":"B14-2015-379682","doi-asserted-by":"publisher","DOI":"10.6138\/jit.2013.14.5.14"},{"key":"B18-2015-379682","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2012.16"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Poeplau S.","key":"B17-2015-379682"},{"issue":"3","key":"B20-2015-379682","first-page":"228","volume":"2","author":"Aung Z.","year":"2013","journal-title":"International Journal of Scientific & Technology Research"},{"key":"B21-2015-379682","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.05.003"},{"first-page":"266","volume-title":"Proceedings of the Virus Bulletin Conference (VB \u201814)","author":"Yu R.","key":"B24-2015-379682"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/379682","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/379682","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/379682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T12:32:14Z","timestamp":1620390734000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/379682"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,1]]},"references-count":19,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2015,9,1]]}},"alternative-id":["10.1155\/2015\/379682"],"URL":"https:\/\/doi.org\/10.1155\/2015\/379682","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,9,1]]}}}