Techniques Allowing BroadcastReceiver Malware on Android Platform
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F15%3A43873534" target="_blank" >RIV/70883521:28140/15:43873534 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Techniques Allowing BroadcastReceiver Malware on Android Platform
Popis výsledku v původním jazyce
Currently, Android represents the most popular mobile operating system in the world. For this reason, Android security issues constitute a very important topic. Whilst the major part of published articles is focused on malware detection techniques usingsome anomalies such as unusual network traffic, this paper concentrates on Android malware from the hacker's point of view. It contains examples of Java as well as XML codes (representing causes) and screenshots (representing effects). Android versions 3.1 and higher contain security improvement which does not allow BroadcastReceiver malware without Activity. The research carried out in this field has discovered the procedure enabling to bypass this security protection by hiding malware Activity class bound to BroadcastReceiver. Based on revealed security weaknesses, some useful recommendations for antivirus companies as well as individual users have been raised.
Název v anglickém jazyce
Techniques Allowing BroadcastReceiver Malware on Android Platform
Popis výsledku anglicky
Currently, Android represents the most popular mobile operating system in the world. For this reason, Android security issues constitute a very important topic. Whilst the major part of published articles is focused on malware detection techniques usingsome anomalies such as unusual network traffic, this paper concentrates on Android malware from the hacker's point of view. It contains examples of Java as well as XML codes (representing causes) and screenshots (representing effects). Android versions 3.1 and higher contain security improvement which does not allow BroadcastReceiver malware without Activity. The research carried out in this field has discovered the procedure enabling to bypass this security protection by hiding malware Activity class bound to BroadcastReceiver. Based on revealed security weaknesses, some useful recommendations for antivirus companies as well as individual users have been raised.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2015
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Recent Advances in Systems
ISBN
978-1-61804-321-4
ISSN
1790-5117
e-ISSN
—
Počet stran výsledku
5
Strana od-do
235-239
Název nakladatele
IEEE
Místo vydání
New Jersey, Piscataway
Místo konání akce
Zakynthos Island
Datum konání akce
16. 7. 2015
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—