{"title":"Yara规则在Android中的实现","authors":"Pragya Bharti, Shreya Saha Roy, A. Suresh","doi":"10.1109/ICCCI56745.2023.10128288","DOIUrl":null,"url":null,"abstract":"Malwares are malicious softwares aimed to damage and destroy computer systems and networks. Malware can exist in a wide variety of devices and operating systems. Cryptographic hashing and fuzzy hashing are two types of signature-based malware detection and classification techniques. In this paper we have tried to study the implementation of YARA rules in Android operating system, the properties of YARA rules and how it helps in an efficient detection of malicious android applications in the market. We outline the syntactical structure of YARA rules, their use cases, and how to create a YARA rule for a single malware or a family of malwares using Androguard and Cuckoo.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementation of Yara Rules in Android\",\"authors\":\"Pragya Bharti, Shreya Saha Roy, A. Suresh\",\"doi\":\"10.1109/ICCCI56745.2023.10128288\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Malwares are malicious softwares aimed to damage and destroy computer systems and networks. Malware can exist in a wide variety of devices and operating systems. Cryptographic hashing and fuzzy hashing are two types of signature-based malware detection and classification techniques. In this paper we have tried to study the implementation of YARA rules in Android operating system, the properties of YARA rules and how it helps in an efficient detection of malicious android applications in the market. We outline the syntactical structure of YARA rules, their use cases, and how to create a YARA rule for a single malware or a family of malwares using Androguard and Cuckoo.\",\"PeriodicalId\":205683,\"journal\":{\"name\":\"2023 International Conference on Computer Communication and Informatics (ICCCI)\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Computer Communication and Informatics (ICCCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCI56745.2023.10128288\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI56745.2023.10128288","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Malwares are malicious softwares aimed to damage and destroy computer systems and networks. Malware can exist in a wide variety of devices and operating systems. Cryptographic hashing and fuzzy hashing are two types of signature-based malware detection and classification techniques. In this paper we have tried to study the implementation of YARA rules in Android operating system, the properties of YARA rules and how it helps in an efficient detection of malicious android applications in the market. We outline the syntactical structure of YARA rules, their use cases, and how to create a YARA rule for a single malware or a family of malwares using Androguard and Cuckoo.