Investigation Into Google Play Security Mechanisms Via Experimental Botnet
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F15%3A43873543" target="_blank" >RIV/70883521:28140/15:43873543 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Investigation Into Google Play Security Mechanisms Via Experimental Botnet
Popis výsledku v původním jazyce
Mobile devices such as smartphones and tablets have become a common part of human society of the 21st century and their popularity is continuously growing. However, certain research papers imply that popularity and security do not reach the same level. They suggest that there are security weaknesses allowing publishing applications with malicious behavior on Google Play. For test reasons of Google Play security mechanisms, a special pair of applications has been developed. The former is a testing application containing a mobile botnet client. It has been designed to be resistant against security scans based on dynamic analysis but its malicious intentions have been presented in uncovered form into the code of application. Such testing application has been published on Google Play. The latter is represented by a malware application with the sole purpose of being fraudulently installed on mobile devices without any security verification including Google Play. Certain interesting results
Název v anglickém jazyce
Investigation Into Google Play Security Mechanisms Via Experimental Botnet
Popis výsledku anglicky
Mobile devices such as smartphones and tablets have become a common part of human society of the 21st century and their popularity is continuously growing. However, certain research papers imply that popularity and security do not reach the same level. They suggest that there are security weaknesses allowing publishing applications with malicious behavior on Google Play. For test reasons of Google Play security mechanisms, a special pair of applications has been developed. The former is a testing application containing a mobile botnet client. It has been designed to be resistant against security scans based on dynamic analysis but its malicious intentions have been presented in uncovered form into the code of application. Such testing application has been published on Google Play. The latter is represented by a malware application with the sole purpose of being fraudulently installed on mobile devices without any security verification including Google Play. Certain interesting results
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2015
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
The 15th IEEE International Symposium on Signal Processing and Information Technology ISSPIT 2015
ISBN
978-1-5090-0480-5
ISSN
—
e-ISSN
—
Počet stran výsledku
6
Strana od-do
564-569
Název nakladatele
IEEE
Místo vydání
New Jersey, Piscataway
Místo konání akce
Abu Dhabi
Datum konání akce
7. 12. 2015
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—