In this article I'll have a a closer look at DroidBox which provides a mobile sandbox to look at Android applications. In the previous post I've dealt with static code analysis. This time will start running our malicious application and look at the "noise" it generates. That would be:
file system access
network activity
interaction with the operating system
interaction with other applications
etc.
more here.................http://blog.dornea.nu/2014/08/05/android-dynamic-code-analysis-mastering-droidbox/
file system access
network activity
interaction with the operating system
interaction with other applications
etc.
more here.................http://blog.dornea.nu/2014/08/05/android-dynamic-code-analysis-mastering-droidbox/