All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Techniques that Allow Hidden Activity Based Malware on Android Mobile Devices

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F16%3A43875196" target="_blank" >RIV/70883521:28140/16:43875196 - isvavai.cz</a>

  • Result on the web

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Techniques that Allow Hidden Activity Based Malware on Android Mobile Devices

  • Original language description

    Currently, number of Android based mobile devices has been constantly increasing. In 2014, Google had over 1 billion active Android users. Android has become the most popular operating system in the world. However, the Android operating system is not only popular with its users but also with malware programmers. The main issue concerning such widespread operating system is not the GUI and reliability but security. This paper tries to open a different perspective on the Android security issue. While the majority of already published articles describes techniques allowing malware detection, this article is focused on malware from the attacker's perspective and tries to shed light on the techniques allowing functioning of hidden Activity based malware on Android mobile devices. Specifically, the text describes a technique based on camouflage of an Activity that allows running of BroadcastReceiver which has been waiting in background and responds to events such as receiving an SMS, pushing the home button, Wi-Fi connection etc. This technique is important for malware aimed at devices with Android version 3.1 or higher. For safety reasons, these Android versions do not allow running of BroadcastReceiver without an Activity. The article describes how to avoid this protection.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

    Result was created during the realization of more than one project. More information in the Projects tab.

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2016

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    International Journal of Scientific Engineering and Applied Science

  • ISSN

    2395-3470

  • e-ISSN

  • Volume of the periodical

    2

  • Issue of the periodical within the volume

    3

  • Country of publishing house

    IN - INDIA

  • Number of pages

    11

  • Pages from-to

    409-419

  • UT code for WoS article

  • EID of the result in the Scopus database