Research Article
[Retracted] Security Hardened and Privacy Preserved Android Malware Detection Using Fuzzy Hash of Reverse Engineered Source Code
Algorithm 3
Extracting malicious packages and classes from reversed engineered code.
| Input: (i) Path of reversed code | | Output: Get malicious packages and classes form reversed engineered code | | Steps | (1) | FUNCTION getMaliciousPackages (PathOfCodeFolder): | (2) | FOR A = 0 to until all the java files which exist in PathOfCodeFolder | (3) | BEGIN | (4) | Split A variable from “\\” and create a list X | (5) | SET directory path “JobPool/with MD5 of apk file (.txt)” | (6) | IF directory path Not Exist | (7) | Create Directory on directory path | (8) | END IF | (9) | Package_list = getPackage(PathOfCodeFolder) | (10) | Read known malicious packages and class name | (11) | Match package_list with known malicious package if matche | (12) | Create rar file of this malicious package | (13) | EXCEPTION: | (14) | PRINT Error in File | (15) | END FOR |
|