Techniques that Allow Hidden Activity Based Malware on Android Mobile Devices
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F16%3A43875196" target="_blank" >RIV/70883521:28140/16:43875196 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Techniques that Allow Hidden Activity Based Malware on Android Mobile Devices
Popis výsledku v původním jazyce
Currently, number of Android based mobile devices has been constantly increasing. In 2014, Google had over 1 billion active Android users. Android has become the most popular operating system in the world. However, the Android operating system is not only popular with its users but also with malware programmers. The main issue concerning such widespread operating system is not the GUI and reliability but security. This paper tries to open a different perspective on the Android security issue. While the majority of already published articles describes techniques allowing malware detection, this article is focused on malware from the attacker's perspective and tries to shed light on the techniques allowing functioning of hidden Activity based malware on Android mobile devices. Specifically, the text describes a technique based on camouflage of an Activity that allows running of BroadcastReceiver which has been waiting in background and responds to events such as receiving an SMS, pushing the home button, Wi-Fi connection etc. This technique is important for malware aimed at devices with Android version 3.1 or higher. For safety reasons, these Android versions do not allow running of BroadcastReceiver without an Activity. The article describes how to avoid this protection.
Název v anglickém jazyce
Techniques that Allow Hidden Activity Based Malware on Android Mobile Devices
Popis výsledku anglicky
Currently, number of Android based mobile devices has been constantly increasing. In 2014, Google had over 1 billion active Android users. Android has become the most popular operating system in the world. However, the Android operating system is not only popular with its users but also with malware programmers. The main issue concerning such widespread operating system is not the GUI and reliability but security. This paper tries to open a different perspective on the Android security issue. While the majority of already published articles describes techniques allowing malware detection, this article is focused on malware from the attacker's perspective and tries to shed light on the techniques allowing functioning of hidden Activity based malware on Android mobile devices. Specifically, the text describes a technique based on camouflage of an Activity that allows running of BroadcastReceiver which has been waiting in background and responds to events such as receiving an SMS, pushing the home button, Wi-Fi connection etc. This technique is important for malware aimed at devices with Android version 3.1 or higher. For safety reasons, these Android versions do not allow running of BroadcastReceiver without an Activity. The article describes how to avoid this protection.
Klasifikace
Druh
J<sub>x</sub> - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
Výsledek vznikl pri realizaci vícero projektů. Více informací v záložce Projekty.
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2016
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
International Journal of Scientific Engineering and Applied Science
ISSN
2395-3470
e-ISSN
—
Svazek periodika
2
Číslo periodika v rámci svazku
3
Stát vydavatele periodika
IN - Indická republika
Počet stran výsledku
11
Strana od-do
409-419
Kód UT WoS článku
—
EID výsledku v databázi Scopus
—