Implementation of Reverse Engineering Techniques for Malware Risk Level Categorization Using Simple Additive Weighting

Authors

  • Muhammad Firdaus Aldiansyah Universitas Pamulang
  • Khaerul Ma'mur Universitas Pamulang

DOI:

https://doi.org/10.55537/cosie.v5i2.1520

Keywords:

Spyware, Reverse Engineering, SAW, Malware Classification, Cybersecurity

Abstract

The rapid growth of Android devices has been accompanied by an increasing number of malware threats, particularly spyware that can steal sensitive user information. This study aims to classify the risk level of Android spyware using reverse engineering techniques, VirusTotal API integration, and the Simple Additive Weighting (SAW) method. Reverse engineering is performed to extract internal malware attributes such as the number of permissions and the category of dangerous permissions from APK files. In addition, external attributes are obtained through VirusTotal API integration, including the number of antivirus engines detecting the malware and the threat category. These attributes are then processed using the SAW method to generate preference values used for classifying spyware risk levels into low, medium, and high categories. The malware sample used in this study is AhMyth, which represents Android spyware. The results indicate that the developed system is capable of providing systematic spyware risk classification and presenting more informative risk information to users. This research is expected to improve user awareness of spyware threats and support the development of more informative malware detection systems

Downloads

Download data is not yet available.

References

[1] R. P. Sari, “Apa itu Malware? Jenis dan Cara Pencegahannya.” Accessed: Jan. 07, 2025. [Online]. Available: https://www.cloudcomputing.id/pengetahuan-dasar/apa-itu-malware-jenis

[2] T. A. Aziz, Z. Sari, C. Sri, and K. Aditiya, “Klasifikasi Malware android dengan menggunakan metode XGBoost Algoritma,” REPOSITOR, vol. 7, no. 1, pp. 103–110, 2025, doi: https://doi.org/10.22219/repositor.v7i1.36564.

[3] T. N. Turnip, C. F. Manurung, and Y. S. Lubis, “Klasifikasi Malware Android Aplikasi Menggunakan Random Forest Berdasarkan Fitur Statik,” JATISI, vol. 10, pp. 926–936, Mar. 2023, Accessed: Mar. 05, 2026. [Online]. Available: https://jurnal.mdp.ac.id/index.php/jatisi/article/download/3164/1181/

[4] R. B. Hadiprakoso, W. Rendra Aditya, F. N. Pramitha, P. Siber, and S. Negara, “Analisis Statis Deteksi Malware Android Menggunakan Algoritma Supervised Machine Learning,” 2022. doi: https://doi.org/10.14421/csecurity.2022.5.1.3116.

[5] A. Maslan et al., “JEPIN (Jurnal Edukasi dan Penelitian Informatika) Klasifikasi dan Deteksi Malware Menggunakan Variasi Model Algoritma Machine learning,” 2025, doi: https://doi.org/10.26418/jp.v11i1.87924.

[6] N. Widiyasono, H. Mubarok, and A. Fatwa, “Analisis Malware Ahmyth pada Platform Android Menggunakan Metode Reverse Engineering,” 2022. doi: https://doi.org/10.29407/gj.v6i2.17749.

[7] F. De Santonario Magno Moises and A. Yogyakarta Joko Dwi Santoso, “Analisis Malware Android Menggunakan Metode Reverse Engineering,” JIKMA), vol. 1, no. 2, 2023, doi: https://doi.org/10.54066/jikma-itb.v1i2.169.

[8] M. K. Umam, A. Kafa Abdillah, A. Izzudin, and S. Nooriansyah, “Analisis Aplikasi Malware pada Android Menggunakan Reverse Engineering dan Framework D4I,” Jurnal Ilmu Komputer dan Desain Komunikasi Visual, vol. 10, no. 2, 2025, doi: https://doi.org/10.55732/3zf9tx13.

[9] I. Puji Saputra and A. Hidayat, “Analisis Trojan Apk Menggunakan Metode Reverse Engineering Pada Serangan Phising,” 2023. doi: https://doi.org/10.24127/jiki.v4i2.4619.

[10] Prasatya, “Mengenal Reverence Engineering dalam Dunia Cyber Security - CODEPOLITAN.” Accessed: Jan. 07, 2025. [Online]. Available: https://www.codepolitan.com/blog/mengenal-reverence-engineering-dalam-dunia-cyber-security/

[11] O. E. Saied and K. H. Thanoon, “A Survey on Static and Dynamic Android Malware Analysis,” Institute of Electrical and Electronics Engineers (IEEE), Dec. 2025, pp. 1–6. doi: 10.1109/icbats66542.2025.11258178.

[12] Y. W, Y. B. Fitriana, S. Esabela, and F. Hamdani, “Deteksi Serangan Malware Pada Web Aplikasi Menggunakan Metode Malware Analis Dinamis dan Statis,” Digital Transformation Technology, vol. 4, no. 1, pp. 461–470, Jul. 2024, doi: 10.47709/digitech.v4i1.4270.

[13] W. Yusnaeni and Y. Tajul Arifin, “Klasifikasi Tingkat Kepuasan Pengguna dengan Menggunakan Metode SAW Pada Layanan PTSP,” Jurnal INSAN (Journal of Information Systems Management Innovation, vol. 5, no. 1, 2025, [Online]. Available: http://jurnal.bsi.ac.id/index.php/jinsan

[14] H. S. Gill, “Malware: Types, Analysis and Classifications.” Accessed: Mar. 05, 2026. [Online]. Available: https://engrxiv.org/preprint/download/2423/4675

[15] Android, “App Architecture.” Accessed: Feb. 23, 2026. [Online]. Available: https://developer.android.com/guide/topics/manifest/permission-element?utm_source=chatgpt.com

Downloads

Published

10-04-2026

How to Cite

Aldiansyah, M. F., & Ma’mur, K. (2026). Implementation of Reverse Engineering Techniques for Malware Risk Level Categorization Using Simple Additive Weighting. Journal of Computer Science and Informatics Engineering , 5(2), 147–156. https://doi.org/10.55537/cosie.v5i2.1520

Issue

Section

Articles