Analisis Binary Pada Aplikasi Android: Kombinasi Teknik Static Dan Dynamic Analysis Untuk Deteksi Malware

Analisis Binary Pada Aplikasi Android: Kombinasi Teknik Static Dan Dynamic Analysis Untuk Deteksi Malware

Authors

  • Jazluth Thoan Sekolah Tinggi Ilmu Komputer Tunas Bangsa
  • Glen Sihombing Sekolah Tinggi Ilmu Komputer Tunas Bangsa
  • Noel Manullang Sekolah Tinggi Ilmu Komputer Tunas Bangsa
  • Indra Gunawan Sekolah Tinggi Ilmu Komputer Tunas Bangsa

Keywords:

malware

DOI:

https://doi.org/10.59435/jgcs.v2i2.2026.52

Abstract

Perkembangan aplikasi Android yang pesat meningkatkan risiko penyebaran malware pada perangkat mobile. Malware Android umumnya dianalisis tanpa akses terhadap kode sumber, sehingga teknik analisis biner menjadi pendekatan penting dalam mendeteksi perilaku berbahaya. Penelitian ini menganalisis efektivitas kombinasi teknik static analysis dan dynamic analysis dalam mendeteksi malware pada aplikasi Android. Static analysis dilakukan dengan menganalisis struktur file APK, permission, dan bytecode tanpa menjalankan aplikasi, sedangkan dynamic analysis dilakukan dengan menjalankan aplikasi dalam lingkungan sandbox untuk mengamati perilaku saat runtime. Hasil penelitian menunjukkan bahwa kombinasi kedua teknik meningkatkan akurasi deteksi dibandingkan penggunaan satu metode saja. Static analysis efektif dalam mendeteksi pola kode mencurigakan, sedangkan dynamic analysis mampu mengidentifikasi aktivitas berbahaya saat aplikasi dijalankan. Pendekatan hybrid ini memberikan mekanisme deteksi malware yang lebih komprehensif.

References

[1] W. Enck et al., “TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones,” ACM Transactions on Computer Systems, 2014.

https://doi.org/10.1145/2619091

[2] A. P. Felt et al., “Android Permissions Demystified,” ACM CCS, 2011.

https://doi.org/10.1145/2046707.2046732

[3] Y. Zhou and X. Jiang, “Dissecting Android Malware: Characterization and Evolution,” IEEE Symposium on Security and Privacy, 2012.

https://doi.org/10.1109/SP.2012.16

[4] V. Rastogi, Y. Chen, and X. Jiang, “DroidChameleon: Evaluating Android Anti-Malware Against Transformation Attacks,” ACM ASIACCS, 2013.

https://doi.org/10.1145/2484313.2484355

[5] K. Tam et al., “CopperDroid: Automatic Reconstruction of Android Malware Behaviors,” NDSS, 2015.

https://www.ndss-symposium.org/ndss2015/ndss-2015-programme/copperdroid-automatic-reconstruction-android-malware-behaviors/

[6] M. Grace et al., “RiskRanker: Scalable and Accurate Zero-day Android Malware Detection,” ACM MobiSys, 2012.

https://doi.org/10.1145/2307636.2307648

[7] D. Arp et al., “Drebin: Effective and Explainable Detection of Android Malware in Your Pocket,” NDSS, 2014.

https://www.ndss-symposium.org/ndss2014/ndss-2014-programme/drebin-effective-and-explainable-detection-android-malware-your-pocket/

[8] M. Lindorfer et al., “MARVIN: Efficient and Comprehensive Mobile App Classification,” IEEE COMPSAC, 2015.

https://doi.org/10.1109/COMPSAC.2015.150

[9] S. Arzt et al., “FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps,” PLDI, 2014.

https://doi.org/10.1145/2594291.2594299

[10] H. Peng et al., “Using Probabilistic Generative Models for Ranking Risks of Android Apps,” ACM CCS, 2012.

https://doi.org/10.1145/2382196.2382284

[11] A. Shabtai et al., “Andromaly: A Behavioral Malware Detection Framework for Android Devices,” Journal of Intelligent Information Systems, 2012.

https://doi.org/10.1007/s10844-010-0148-x

[12] S. Hou et al., “Hindroid: An Intelligent Android Malware Detection System,” ACM SIGKDD, 2017.

https://doi.org/10.1145/3097983.3098026

[13] L. Onwuzurike et al., “MaMaDroid: Detecting Android Malware by Building Markov Chains,” NDSS, 2018.

https://www.ndss-symposium.org/ndss2018/ndss-2018-programme/mamadroid-detecting-android-malware-building-markov-chains/

[14] J. Crussell et al., “Attack of the Clones: Detecting Cloned Applications,” ESORICS, 2012.

https://doi.org/10.1007/978-3-642-33167-1_3

[15] A. Reina et al., “A System Call-Centric Analysis Technique to Reconstruct Android Malware Behaviors,” EuroSec, 2013.

https://doi.org/10.1145/2486788.2486793

[16] Google, “Android Security Overview,” Android Open Source Project, 2023.

https://source.android.com/security

[17] C. C. Aggarwal, Neural Networks and Deep Learning, Springer, 2018.

https://doi.org/10.1007/978-3-319-94463-0

[18] I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, MIT Press, 2016.

https://www.deeplearningbook.org

[19] N. Peiravian and X. Zhu, “Machine Learning for Android Malware Detection Using Permission and API Calls,” ICTAI, 2013.

https://doi.org/10.1109/ICTAI.2013.114

[20] S. Yerima et al., “Android Malware Detection Using Machine Learning Techniques,” IEEE Cyber Security Conference, 2014.

https://doi.org/10.1109/CSCloud.2014.34

[21] R. Xu et al., “Aurasium: Practical Policy Enforcement for Android Applications,” USENIX Security Symposium, 2012.

https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/xu

[22] A. Sadeghi et al., “A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software,” IEEE Transactions on Software Engineering, 2017.

https://doi.org/10.1109/TSE.2016.2630727

[23] P. Faruki et al., “Android Security: A Survey of Issues, Malware Penetration, and Defenses,” IEEE Communications Surveys & Tutorials, 2015.

https://doi.org/10.1109/COMST.2014.2386139

[24] M. Egele et al., “PiOS: Detecting Privacy Leaks in iOS Applications,” NDSS, 2011.

https://www.ndss-symposium.org/ndss2011/pios-detecting-privacy-leaks-ios-applications/

[25] J. Brownlee, Machine Learning Algorithms From Scratch with Python, 2016.

https://machinelearningmastery.com/machine-learning-algorithms-from-scratch/

Published

2026-08-28