All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Insight into Contemporary Dissemination Techniques of Mobile Botnet Clients (Bots)

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F16%3A43875179" target="_blank" >RIV/70883521:28140/16:43875179 - isvavai.cz</a>

  • Result on the web

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Insight into Contemporary Dissemination Techniques of Mobile Botnet Clients (Bots)

  • Original language description

    Currently, smartphones and tablets offer a wide range of functionalities such as web browsing, social networking and above all using banking applications. This has resulted in constant increase in popularity of mobile devices connected to the Internet 24/7. In 2nd quarter of 2015, the Android operating system has dominated the market with an 82.8% share, which makes it the most widespread mobile operating system in the world. However, this popularity is double-edged, including both users and botnet creators. The research papers "Android Botnets on the Rise: Trends and Characteristics and How Can Botnets Cause Storms?" as well as "Understanding the Evolution and Impact of Mobile Botnets" imply urgent need for additional research into this field. Therefore, the research described by this article includes not only theoretical study into the ways of botnet command delivering and essential botnet knowledge based on published research but also practical investigation into the field of ways of infecting smartphones and tablets with botnet clients (bots). Special tools have been developed for performing certain malicious actions enabling real testing of safety mechanisms of the Google Play. These tools have been also used in combination with other useful techniques such as social engineering and deceitful actions trying to get users to unintentional cooperation. Finally, some challenging results and security vulnerabilities have been raised by the research.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

    Result was created during the realization of more than one project. More information in the Projects tab.

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2016

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Tenth International Conference on Emerging Security Information, Systems and Technologies

  • ISBN

    978-1-61208-493-0

  • ISSN

  • e-ISSN

  • Number of pages

    7

  • Pages from-to

    117-123

  • Publisher name

    IARIA XPS Press

  • Place of publication

    Wilmington

  • Event location

    Nice

  • Event date

    Jul 24, 2016

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article