The Behavioral Analysis of Android Malware
|
|
|
- Sarah Walton
- 9 years ago
- Views:
Transcription
1 , pp The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan, China Abstract. With the rising share of Android platform in smartphone market, the number of malware aiming at Android platform is also increasing, and the problems of security threats and privacy disclosure caused by malicious behaviors are becoming more serious. To solve these problems, using static behavioral analysis approach, the thesis analyzes Android malware, summarizes its malicious behaviors and its ways of stealing private data, and puts forward the methods of detection and prevention. Key words: Android; malware; decompilation; detection 1 Introduction With the reduction of smartphone s cost and the rapid development of the application software based on smartphones, the smartphone becomes more and more popular in people s life in recent years. Due to the characteristic of openness, the share of Android smartphone is continually increasing in smartphone market. According to IDC, the market share of Android smartphone is up to 81 percent till the third quarter of 2013, which far exceeds all the other competitors. Android smartphone has brought great convenience to people s life, at the same time, it causes problems of security. CNCERT has detected 702, 861 mobile internet malicious sample programs in 2013, among which 99.5 percent aims at Android platform[1]. These malicious programs not only affect smartphone users normal use, but also have security threats such as malicious fee deduction, stealing information and remote control, which bring loss to smartphone users. In terms of intentions of these mobile malware, the malicious fee-deducting malware continues to take the first place (71.5%), fee consumption (15.1%) comes to the second place, and the followings are system damage and stealing information, accounting for 3.2%. So the detection and prevention of malicious software for smartphones has become an important issue for Network operators and the departments of cyber security to solve immediately. ISSN: ASTL Copyright 2014 SERSC
2 2 Research Review The experts and scholars at home and abroad have done some researches about the malware of smartphones and have gained some achievements. For instance, M. Miettinen and P. Halonen s essay analyzes the malware detection on mobile smart devices and indicates its problems and insufficiency [2]. The essay from Enck (Enck et al., 2010) focuses on the stealing privacy caused by the malware and comes up with the relevant scheme of monitoring [3]. Collin Mulliner and Aubrey-Derrick Schmidt from Technische University Berlin have also done some researches on smartphone malware [4~5]. Abhijit Bose s essay points out that we can use SVM to detect malicious behaviors of mobile handsets, and establishes the relevant detection model [6]. At present, the study of smartphone malware has gained some achievements but the solving methods are mainly borrowed from techniques in computer platform. To sum up, the present study of smartphone malware is focused on the following aspects: 1. The study of malicious software including mobile botnets attacks on smartphone users, Telecommunication Network and Internet and its resulting security threats; 2. The study of the design of mobile botnets based on the traditional botnets design, which includes mobile botnets network architecture, its ways of transmission, its command and control on the net and its communication algorithm, etc.. 3 The Detection Analysis of Android Malicious Software 3.1. The Security Analysis of Android Platform Android platform is developed by Google company based on Linux2.6, which is composed of Linux and Java. It adopts the layered architecture design including Linux Kernel, Libraries and Android Runtime, Application Framework, and Applications. Using Java, Android applications operate on Dalvik VM, to which Android runtime environment provides Java core libraries. And each Android application must run on Dalvik VM. When an Android application runs, it presents in the system as a single process and there is isolation between processes. Each Android application has an AndroidManifest.xml file which consists of the permission to run the application. If the application needs to use other permission which is provided by the AndroidManifest.xml file, it will be prevented or terminated by the system and the application will reminds the user of the needed permission before setup. As the security measure of Android system, it can control the application s behaviors which are beyond its limit, it can not prevent the application to use the acquired permission to have malicious behaviors. To most users, they usually do not carefully check the access permission that the application applies for when installing it. Another security measure that Android system adopts is the file signature of APK applications. When releasing Android applications, APK applications can use Debug 42 Copyright 2014 SERSC
3 Key tool to compile and sign. This signature mechanism can protect the homology of the applications, so when a modified malicious application is installed on the Android system, the system will not allow this application to be installed or upgraded as the modified malicious application can not match the original signature. The file signature system can only protect the installed applications not to be modified maliciously, but it can not protect the newly installed applications and the pre-existing applications which already contain malicious behaviors. When Android applications are published on Google Play platform, the developer s register account is needed, at the same time, the forthcoming applications must be tested by Google Play Developer Distribution Agreement (DDA) and Google Play Developer Program Policies (DPP). To the applications which violate the agreements and provisions, the publication will be suspended and the developer will be informed; To the malicious software, Google Play Store can unload user s software remotely. Google Play takes some measures to check Android applications, but Google Play Store is not like Apple App Store and Windows Phone Marketplace which check the forthcoming applications rigorously and only allow the qualified ones to be published. There are many Android online applications stores in different parts of the world publishing unchecked applications, which causes the wide spread of Android malware. Besides, Brush package and social networks provide more convenient ways to spread malicious software Detection Methods of Android Malware Presently, there are two Methods to detect Android Malware: static behavioral detection method and dynamic behavioral detection method Static Behavioral Detection Method Through analyzing and comparing the instruction codes of the software, static behavioral detection method detects whether the software contains API function calls which can cause malicious behaviors. Using this method to detect, it firstly acquires Java source codes of Android application software, analyzes whether the software contains sensitive function calls and whether there are security threats, and then comes up with the conclusion whether the software is malicious or not. Static behavioral detection method needs to decompile the application by ways of reverse engineering to acquire source codes. But the analysis is often affected by software encryption and implicit functions (virtual functions, etc), so it usually can not draw the correct conclusion Dynamic Behavioral Detection Method Dynamic behavioral detection method works during the running of the application. It detects and records the system s communications, short messages, network interfaces and the network access of the relevant implicit information, thus acquiring the Copyright 2014 SERSC 43
4 application s behavior model. Dynamic behavioral detection method can solve the problems that static detection method can not do because the application codes are encrypted or confused. Dynamic behavioral detection method constructs operation environment by using sandbox, virtual machine and other forms, and simulates the execution of the application to acquire the application s behavior model. It has higher request to the real-time detection. 4 The Behavioral Analysis of Android Malware When detecting Android malware, whether static detection method or dynamic one, the first step is to acquire the application s way of behaviors including normal applications and malicious software, then it uses machine learning to acquire the characteristic of the malicious software to distinguish the malicious applications from the normal ones. Focusing on the analysis of the function calls of Android applications, the essay analyzes the function calls of the malicious software to acquire the typical file characteristic of the malicious software, which is used to be the basis of the detection Acquiring the Malicious Behaviors Firstly, the author collects 50 malicious software samples including Trojan horse, spyware and worms, etc., decompiles them, and analyzes the function calls of their APK source codes. In the process of decompilation, the author uses DEX2JAR to transform classes.dex file to Java codes, thus the transformed classes.dex file contains APK implementation codes, acquires its resources file and class file, and uses Java Decompiler to transform the class file to readable format. The binary AndroidManifest.XML file is transformed by AXMLPrinter2[7]. After all the transformations, the author analyzes the software codes using AndroidManifest.XML file to get all the API calls. The behaviors of 50 malicious software are shown in table 1. Table 1. The Statistic of the Samples Malicious Behaviors Behaviors number Receives SMS/MMS 25 Sends SMS/MMS 25 Send Data over HTTP(s) 23 Uses WiFi 20 Write to disk (internal or external flash card) 20 Obfuscation 20 Send Data (cellular) 19 Receive Data over HTTP(s) 18 Access Device Location 18 Receive Data (cellular) 15 Reads from Disk (internal or external flash card) 14 Can execute commands 12 Mount/Unmount Filesystems Copyright 2014 SERSC
5 Encryption 6 Set Network Properties 6 Send Data (Raw) 5 Receive Data(Raw) 4 After analyzing the behaviors of malicious software in table 1, we can find that malicious software collects users private information while having these malicious behaviors The Analysis of Malicious Behaviors After analyzing the behaviors of malicious software, we can conclude the following five forms of malicious software: (1) Malicious fee deduction; (2) Remote control; (3) Stealing information; (4) Rates consumption; (5) Rogue actions. The relevant permissions of the called systems to the above malicious behaviors are shown in table 2. Malicious Behaviors malicious fee-deducting Remote Control Stealing Information fee consumption rogue behavior Table 2. The Main Permissions to Each Malicious Behavior Main Permissions android.permission.receive(send)_sms/mms android.permission.read_sms android.permission.call_phone android.permission.call_privileged android.permission.receive(send)_sms/mms android.permission.read_sms android.permission.read_contacts android.permission.access_fine_location android.permission.access_coarse_location android.permission.read(write)_call_log android.permission.read_phone_state android.permission.install(delete)_packages 5 Detection and Prevention Through the above analysis of the software samples, we can acquire the main forms of Android malicious software, as shown in table 2. The result of the analysis can Copyright 2014 SERSC 45
6 provide corresponding basis to the detection and prevention of Android malicious software Permission Administration The application permissions are rigidly set in Android system, and each application runs by ways of process isolation. If an application needs to access the data and directories beyond this application, it will apply to the Android system before installing waiting the users for approval. But most users often do not carefully consider whether the applying permission is reasonable when installing the application, so it can not make sure that the malicious software will not be normally installed. The bottom frame of Android system uses Linux kernel, and it can establish relevant access policy to each file in smartphone and store it in the storage space of Linux kernel. Therefore, we can set the permissions according to the importance of files[8]. The permissions of files are set in table 3. Table 3. the Set of File Permissions File name /system/app /system/bin /sbin /data/app /data/data /sdcard Permissions read read Read Read Null Read write rename create /cache Read write unlink create The above method can prevent smartphones from being attacked by malicious software to a large extent, and protect data of smartphones not to be illegally used. But this method usually affects the running of the normal software when it blocks the access of the malicious software, because the method s shortage is that its establishment of access policy is too extensive Behavioral Detection At present, behavioral detection is a common method to detect Android malicious software. Both static behavioral detection and dynamic behavioral detection analyze the characteristic of the malicious software, then use machine learning to establish relevant regulations to distinguish the malicious applications from the normal ones. Now the range of Android application software is continually expanding and its application forms are updated constantly, therefore, to keep its accuracy the 46 Copyright 2014 SERSC
7 behavioral detection method should update constantly in order to adapt new environment. The common way is to combine the behavioral detection to black and white lists, which reduces the complexity of the detection and increases the detecting efficiency. 6 Conclusion Due to its characteristic of openness, Android platform provides convenience to the development and promotion of the application software, which is an important factor for it to occupy smartphone market. On the other hand, it is just due to the characteristic of openness that the spread of the Android malicious software is far greater than other platforms. Along with the coming of 4G and the improvement of the performances of smartphones, the harm of the malicious behaviors is also increasing, which brings greater challenges to the detection and prevention of Android malicious software. If the security problems of Android platform and the approval mechanism are not improved in the process of the future development, the security problems of Android platform would become another Windows. Acknowledgment. This research was supported by the Anhui provincial college and university Natural Science Foundation, China (No.KJ2013Z302), and the 2013 Huainan City Science and technology project, China (No.67). References 1. CNCERT/CC. CNCERT/CC Annual Report 2013[R]. Annual Report.pdf.2014: M.Miettinen, P.Halonen. Host-based intrusion detection for advanced mobile devices[j]. Information Networking and Applications, 2006,20(4): Enck W, Gilbert P, Chun B, et al. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones[C]//Proc. of OSDI 10. Vancouver, Canada: [s. n.], Schmidt A D. Smartphone malware evolution revisited: Android next target?. In Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE),Montreal, QC, 2009: Schmidt A D. Detection of Smartphone Malware[ Dissertation ]. Universitatsbibliothek, Bose A, Hu X, Shin K G, et al. Behavioral detection of malware on mobile handsets[c]//proceedings of the 6th international conference on Mobile systems, applications, and services. ACM, 2008: Sharma K, Dand T, Oh T, et al. Malware Analysis for Android Operating[C]//8th Annual Symposium on Information Assurance (ASIA 13). 2013: LIU Chang-ping, FAN Ming-yu, WANG Guang-wei, et al. Light-weight access control oriented toward Android[J]. Application Research of Computers, 2010,27(7): Copyright 2014 SERSC 47
Malware Analysis for Android Operating
Malware Analysis for Android Operating Kriti Sharma, Trushank Dand, Tae Oh and William Stackpole Abstract The number of mobile devices has dramatically increased in the last decade. As the mobile devices
Research on Situation and Key Issues of Smart Mobile Terminal Security
Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
Hacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture
, pp. 127-136 http://dx.doi.org/10.14257/ijfgcn.2015.8.1.14 High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture Gengxin Sun and Sheng Bin International College
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing
Pentesting Android Apps. Sneha Rajguru (@Sneharajguru)
Pentesting Android Apps Sneha Rajguru (@Sneharajguru) About Me Penetration Tester Web, Mobile and Infrastructure applications, Secure coding ( part time do secure code analysis), CTF challenge writer (at
Reversing Android Malware
Reversing Android Malware The Honeynet Project 10 th Annual Workshop ESIEA PARIS.FR 2011-03-21 MAHMUD AB RAHMAN (MyCERT, CyberSecurity Malaysia) Copyright 2011 CyberSecurity Malaysia MYSELF Mahmud Ab Rahman
Malware detection methods for fixed and mobile networks
Malware detection methods for fixed and mobile networks Gavin McWilliams January 2013 [email protected] Academic Centre of Excellence in Cyber Security Research Presentation Outline Malware detection
Mobile Malware and Spyware: Working Through the Bugs. Detective Cindy Murphy 608-267-8824 [email protected]
Mobile Malware and Spyware: Working Through the Bugs Detective Cindy Murphy 608-267-8824 [email protected] The Mobile Malware Threat 155% increase in mobile malware from 2010 to 2011 614% increase
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
Android Architecture For Beginners
Leon Romanovsky [email protected] www.leon.nu April 22, 2013 Introduction Linux-based operating system with market share - 69.70% in smartphones, 42% in tablets, available on smart TVs and mini PC. History
Pentesting Mobile Applications
WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司 Pentesting Mobile Applications www.dbappsecurity.com.cn Who am I l Frank Fan: CTO of DBAPPSecurity Graduated from California State University as a Computer
Messing with the Android Runtime
Northeastern University Systems Security Lab Messing with the Android Runtime Collin Mulliner, April 26th 2013, Singapore crm[at]ccs.neu.edu SyScan Singapore 2013 $ finger [email protected] 'postdoc'
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Introduction to Android
Introduction to Android Android Smartphone Programming Matthias Keil Institute for Computer Science Faculty of Engineering October 19, 2015 Outline 1 What is Android? 2 Development on Android 3 Applications:
Lecture 17: Mobile Computing Platforms: Android. Mythili Vutukuru CS 653 Spring 2014 March 24, Monday
Lecture 17: Mobile Computing Platforms: Android Mythili Vutukuru CS 653 Spring 2014 March 24, Monday Mobile applications vs. traditional applications Traditional model of computing: an OS (Linux / Windows),
MASTER'S THESIS. Android Application Security with OWASP Mobile Top 10 2014. James King 2014
MASTER'S THESIS Android Application Security with OWASP Mobile Top 10 2014 James King 2014 Master of Arts (60 credits) Master of Science in Information Security Luleå University of Technology Department
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Index Terms: Smart phones, Malwares, security, permission violation, malware detection, mobile devices, Android, security
Permission Based Malware Detection Approach Using Naive Bayes Classifier Technique For Android Devices. Pranay Kshirsagar, Pramod Mali, Hrishikesh Bidwe. Department Of Information Technology G. S. Moze
Android Security - Common attack vectors
Institute of Computer Science 4 Communication and Distributed Systems Rheinische Friedrich-Wilhelms-Universität Bonn, Germany Lab Course: Selected Topics in Communication Management Android Security -
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications
Virus Bulletin 2013 The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications Next Generation Intelligent Networks Research Center (nexgin RC) http://wwwnexginrcorg/
A monitoring method of sensitive calls based on the Android platform software behavior Cheng Sun, Sujuan Qin
5th International Conference on Computer Sciences and Automation Engineering (ICCSAE 2015) A monitoring method of sensitive calls based on the Android platform software behavior Cheng Sun, Sujuan Qin State
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Research and Design of Universal and Open Software Development Platform for Digital Home
Research and Design of Universal and Open Software Development Platform for Digital Home CaiFeng Cao School of Computer Wuyi University, Jiangmen 529020, China [email protected] Abstract. With the development
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Mobile applications security Android OS (case study) Maciej Olewiński. Cryptographic Seminar 16.05.2012r.
Mobile applications security Android OS (case study) Maciej Olewiński Cryptographic Seminar 16.05.2012r. Presentation s schedule Mobile devices market Smartphone s domination is coming Android basics Main
Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3 1,2College of Mathematical
Security Threats for Mobile Platforms
Security Threats for Mobile Platforms Goran Delac Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia Abstract - The proliferation of smart-phone devices, with ever advancing
API Tracing Tool for Android-Based Mobile Devices
API Tracing Tool for Android-Based Mobile Devices Seonho Choi, Michael Bijou, Kun Sun, and Edward Jung Abstract We developed an Application Programming Interface (API) tracing tool for Android-based mobile
A proposal to realize the provision of secure Android applications - ADMS: an application development and management system -
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing A proposal to realize the provision of secure Android applications - ADMS: an application development
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
The OWASP Foundation http://www.owasp.org
Android reverse engineering: understanding third-party applications OWASP EU Tour 2013 June 5, 2013. Bucharest (Romania) Vicente Aguilera Díaz OWASP Spain Chapter Leader Co-founder of Internet Security
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security A World of Constant Threat We live in a world on constant threat. Every hour of every day in every country around the globe hackers
CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001
CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P Abstract: Now a day s most of the people used in smart phones. Smartphone
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Blackbox Android. Breaking Enterprise Class Applications and Secure Containers. Marc Blanchou Mathew Solnik 10/13/2011. https://www.isecpartners.
Blackbox Android Breaking Enterprise Class Applications and Secure Containers Marc Blanchou Mathew Solnik 10/13/2011 https://www.isecpartners.com Agenda Background Enterprise Class Applications Threats
Introduction to Android
Introduction to Android 26 October 2015 Lecture 1 26 October 2015 SE 435: Development in the Android Environment 1 Topics for Today What is Android? Terminology and Technical Terms Ownership, Distribution,
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Detection and Identification of Android Malware Based on Information Flow Monitoring
Detection and Identification of Android Malware Based on Information Flow Monitoring Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong To cite this version: Radoniaina Andriatsimandefitra, Valérie
Android Packer. facing the challenges, building solutions. Rowland YU. Senior Threat Researcher Virus Bulletin 2014
Android Packer facing the challenges, building solutions Rowland YU Senior Threat Researcher Virus Bulletin 2014 1 What is Android Packer? Android packers are able to encrypt an original classes.dex file,
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
DiffUser: Differentiated User Access Control on Smartphones
DiffUser: Differentiated User Access Control on Smartphones Xudong Ni, Zhimin Yang, Xiaole Bai, Adam C. Champion, and Dong Xuan Department of Computer Science and Engineering The Ohio State University
A Research on Camera Based Attack and Prevention Techniques on Android Mobile Phones
A Research on Camera Based Attack and Prevention Techniques on Android Mobile Phones Anushree Pore, Prof. Mahip Bartere PG Student, Dept. of CSE, G H Raisoni College of Engineering, Amravati, Maharashtra,
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,
Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws
Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces
QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing
Journal of Computational Information Systems 11: 11 (2015) 3875 3881 Available at http://www.jofcis.com QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing Jingzheng
Popular Android Exploits
20-CS-6053 Network Security Spring, 2016 An Introduction To Popular Android Exploits and what makes them possible April, 2016 Questions Can a benign service call a dangerous service without the user knowing?
Modern Accounting Information System Security (AISS) Research Based on IT Technology
, pp.163-170 http://dx.doi.org/10.14257/astl.2016. Modern Accounting Information System Security (AISS) Research Based on IT Technology Jiamin Fang and Liqing Shu Accounting Branch, Jilin Business and
MOBILE MALWARE REPORT
TRUST IN MOBILE MALWARE REPORT THREAT REPORT: H2/2014 CONTENTS At a Glance 03-03 Forecasts and trends 04-04 Current situation: 4.500 new Android malware instances every day 05-05 Third-party App-Stores
Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder
Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats Eva Chen CEO and Co-Founder Consistent Vision for 25 Years A world safe for exchanging
Smartphone market share
Smartphone market share Gartner predicts that Apple s ios will remain the second biggest platform worldwide through 2014 despite its share deceasing slightly after 2011. Android will become the most popular
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
Security Solution for Android Application Assessment
Security Solution for Android Application Assessment Aparna Bhonde 1, Madhumita Chatterjee 2 Department of IT, PIIT, New Panvel, Mumbai, India 1,2 Abstract: Android Operating System is dominating the share
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION CHECK POINT ALERTED EZCAST THAT ITS SMART TV DONGLE, WHICH IS USED BY APPROXIMATELY 5 MILLION USERS, IS EXPOSED TO SEVERE REMOTE CODE EXECUTION VULNERABILITIES
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
Mobile-Sandbox: Having a Deeper Look into Android Applications
Mobile-Sandbox: Having a Deeper Look into Android Applications Michael Spreitzenbarth, Felix Freiling Friedrich-Alexander-University Erlangen, Germany michael.spreitzenbarth, [email protected] Florian
Android Operating System
Prajakta S.Adsule Student-M.B.A.[I.T.] BharatiVidyapeeth Deemed University,Pune(india) [email protected] Mob. No. 9850685985 Android Operating System Abstract- Android operating system is one
Security Issues in Android Custom ROMs
Security Issues in Android Custom ROMs HTML Version Anant Shrivastava http://anantshri.info Contents Abstract... 3 Introduction to Android... 3 What is Android ROM... 3 Types of ROM... 4 Advantages of
Android malware analysis InfoSec Institute IT Training and Information Security Resources
Android malware analysis InfoSec Institute IT Training and Information Security Resources http://resources.infosecinstitute.com/android-malw are-analysis/ October 15, 2011 The advance in technology brought
A Survey on Mobile Forensic for Android Smartphones
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar Apr. 2015), PP 15-19 www.iosrjournals.org A Survey on Mobile Forensic for Android Smartphones
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
Control Theoretic Adaptive Monitoring Tools for the Android Platform
Control Theoretic Adaptive Monitoring Tools for the Android Platform DAVID REYNOLDS Department of Computer Science Texas State University San Marcos, USA [email protected] MINA GUIRGUIS Department of
How we keep harmful apps out of Google Play and keep your Android device safe
How we keep harmful apps out of Google Play and keep your Android device safe February 2016 Bad apps create bad experiences, so we work hard to keep them off your device and out of Google Play. In 2015,
An ECG Monitoring and Alarming System Based On Android Smart Phone
Communications and Network, 2013, 5, 584-589 http://dx.doi.org/10.4236/cn.2013.53b2105 Published Online September 2013 (http://www.scirp.org/journal/cn) An ECG Monitoring and Alarming System Based On Android
Publishing to TIZEN Using the Automated Conversion/Repackaging of Existing Android Apps. Hyeokgon Ryu, Infraware Technology, Ltd.
Publishing to TIZEN Using the Automated Conversion/Repackaging of Existing Android Apps Hyeokgon Ryu, Infraware Technology, Ltd. Talking about Needs of Automated Converting from Android To Tizen Introduce
Two-factor Protection Scheme in Securing the Source Code of Android Applications
Two-factor Protection Scheme in Securing the Source Code of Android Applications Daniel TSE [email protected] Ka Fai WONG [email protected] Zihuan LI [email protected] Wai Hou CHOI
Introduction to Android
Introduction to Android Poll How many have an Android phone? How many have downloaded & installed the Android SDK? How many have developed an Android application? How many have deployed an Android application
Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks
Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks Priyank Singhal Student, Computer Engineering Sardar Patel Institute of Technology University
A Scheme for Implementing Load Balancing of Web Server
Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public
ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA. ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York
ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an
GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS
Embedded Systems White Paper GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS September 2009 ABSTRACT Android is an open source platform built by Google that includes an operating system,
A Review of Different Comparative Studies on Mobile Operating System
Research Journal of Applied Sciences, Engineering and Technology 7(12): 2578-2582, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: August 30, 2013 Accepted: September
Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.
Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures
Review and Evaluation of Performance Measures in the Mobile Operating Systems
International Journal of Scientific & Engineering Research Volume 4, Issue3, March-2013 1 Review and Evaluation of Performance Measures in the Mobile Operating Systems Farhad Soleimanian Gharehchopogh,
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
How To Protect Your Mobile From Attack From A Signalling Storm
ICL, TUB, CERTH, Telecom Italia IT, COSMOTE, HISPASEC Erol Gelenbe Fellow of the French National Academy of Engineering Dynamic Real-Time Security for Seamless Service Provisioning in the Mobile Ecosystem
... Mobile App Reputation Services THE RADICATI GROUP, INC.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding
Degree Certificate Authentication using QR Code and Smartphone
Degree Certificate Authentication using and Smartphone Ankit Singhal M.Tech Computer Science Faculty of Science, Dayalbagh Educational Institute, Dayalbagh, Agra, U.P, India R.S Pavithr Assistant Professor
Smart Anytime, Safe Anywhere. Climax Home Portal Platform. Envisage and Enable a Connected Future
Smart Anytime, Safe Anywhere Climax Home Portal Platform Envisage and Enable a Connected Future Climax Home Portal Platform An IP/GPRS-Based Solution to Deliver Smart Home and Mobile Control Services Reliable
A Practical Analysis of Smartphone Security*
A Practical Analysis of Smartphone Security* Woongryul Jeon 1, Jeeyeon Kim 1, Youngsook Lee 2, and Dongho Won 1,** 1 School of Information and Communication Engineering, Sungkyunkwan University, Korea
Android Architecture. Alexandra Harrison & Jake Saxton
Android Architecture Alexandra Harrison & Jake Saxton Overview History of Android Architecture Five Layers Linux Kernel Android Runtime Libraries Application Framework Applications Summary History 2003
