<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>02030nam a22001337a 4500</leader>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">64609</subfield>
    <subfield code="d">64606</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="a">Kashif Ali Dahri</subfield>
    <subfield code="a">14MSIT09</subfield>
    <subfield code="a">Dr.. Muhammad Saleem Vighio</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Detection and prevention of malwares in android operating system</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Nawabshah</subfield>
    <subfield code="b">Quest</subfield>
    <subfield code="c">2018</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">70p.</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
    <subfield code="a">






ABSTRACT

the  Internet is not any more sheltered. malware can be discovered anywhere on the Internet the  risk of mobile rnalware has. increased  due to the  increasing popularity of smartphones  With its great market share. the android operating system has become a  prime target for malware developers. When an Android smartphone is injected with malware, it  results in compromising privacy of user by steeling sensitive and private information like contacts, ids. passwords. photos and call records etc. Compared to any other category games are the most preferred zone for attackers due to the user's high interest in games applications When on end user download a game which is in injected with malicious code, user data is injected without bringing in the knowledge of the user,
though. there are still not  sufficient protection mechanism or guideline stated for end users against android malware. this study offers a new method to detect the android malware. the advantage of this new method is that only utilizes android manifest files for the detection of malware. Manifest files are included in all android applications and consequently the offered method can be applied to all android applications It can be considered  as a  lightweight method for malware detection. and
its efficiency is experimental) confirmed b) testing and comparing the results of 50 android games samples, out of  these. 25 are benign and 25 are real malwares  Moreover. different kinds of malwares identification and  malware prevention guidelines are also deliberated for the safe usage of the Android operating system</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Department of Information Technology</subfield>
  </datafield>
  <datafield tag="856" ind1=" " ind2=" ">
    <subfield code="u">http://tinyurl.com/4mwhse2t</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="c">THESIS</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">RESEARCH</subfield>
    <subfield code="b">RESEARCH</subfield>
    <subfield code="d">2019-02-27</subfield>
    <subfield code="l">0</subfield>
    <subfield code="p">MP/40-443</subfield>
    <subfield code="r">2019-02-27 00:00:00</subfield>
    <subfield code="y">THESIS</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">RESEARCH</subfield>
    <subfield code="b">RESEARCH</subfield>
    <subfield code="d">2023-12-14</subfield>
    <subfield code="l">0</subfield>
    <subfield code="p">MP/53-662</subfield>
    <subfield code="r">2023-12-14 00:00:00</subfield>
    <subfield code="w">2023-12-14</subfield>
    <subfield code="y">THESIS</subfield>
  </datafield>
</record>
