Techniques that Allow Hidden Activity Based Malware on Android Mobile Devices
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F16%3A43875196" target="_blank" >RIV/70883521:28140/16:43875196 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Techniques that Allow Hidden Activity Based Malware on Android Mobile Devices
Original language description
Currently, number of Android based mobile devices has been constantly increasing. In 2014, Google had over 1 billion active Android users. Android has become the most popular operating system in the world. However, the Android operating system is not only popular with its users but also with malware programmers. The main issue concerning such widespread operating system is not the GUI and reliability but security. This paper tries to open a different perspective on the Android security issue. While the majority of already published articles describes techniques allowing malware detection, this article is focused on malware from the attacker's perspective and tries to shed light on the techniques allowing functioning of hidden Activity based malware on Android mobile devices. Specifically, the text describes a technique based on camouflage of an Activity that allows running of BroadcastReceiver which has been waiting in background and responds to events such as receiving an SMS, pushing the home button, Wi-Fi connection etc. This technique is important for malware aimed at devices with Android version 3.1 or higher. For safety reasons, these Android versions do not allow running of BroadcastReceiver without an Activity. The article describes how to avoid this protection.
Czech name
—
Czech description
—
Classification
Type
J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)
CEP classification
IN - Informatics
OECD FORD branch
—
Result continuities
Project
Result was created during the realization of more than one project. More information in the Projects tab.
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach
Others
Publication year
2016
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
International Journal of Scientific Engineering and Applied Science
ISSN
2395-3470
e-ISSN
—
Volume of the periodical
2
Issue of the periodical within the volume
3
Country of publishing house
IN - INDIA
Number of pages
11
Pages from-to
409-419
UT code for WoS article
—
EID of the result in the Scopus database
—