{"title":"Implementation of Yara Rules in Android","authors":"Pragya Bharti, Shreya Saha Roy, A. Suresh","doi":"10.1109/ICCCI56745.2023.10128288","DOIUrl":null,"url":null,"abstract":"Malwares are malicious softwares aimed to damage and destroy computer systems and networks. Malware can exist in a wide variety of devices and operating systems. Cryptographic hashing and fuzzy hashing are two types of signature-based malware detection and classification techniques. In this paper we have tried to study the implementation of YARA rules in Android operating system, the properties of YARA rules and how it helps in an efficient detection of malicious android applications in the market. We outline the syntactical structure of YARA rules, their use cases, and how to create a YARA rule for a single malware or a family of malwares using Androguard and Cuckoo.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI56745.2023.10128288","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Malwares are malicious softwares aimed to damage and destroy computer systems and networks. Malware can exist in a wide variety of devices and operating systems. Cryptographic hashing and fuzzy hashing are two types of signature-based malware detection and classification techniques. In this paper we have tried to study the implementation of YARA rules in Android operating system, the properties of YARA rules and how it helps in an efficient detection of malicious android applications in the market. We outline the syntactical structure of YARA rules, their use cases, and how to create a YARA rule for a single malware or a family of malwares using Androguard and Cuckoo.