Javascript must be enabled to continue!
An experimental malware for smartphones
View through CrossRef
Android operating system has become one of the platforms developers used to introduce their malicious activities into the smartphone world through Android Applications (App). Although the Google Play Store implements security countermeasures against Android malware, these measures have vulnerabilities. A major weakness is that users often accept all requested permissions as mandatory when installing an application, without understanding the risks. This gives developers the basis to achieve their illicit actions. The aim of the study is to develop a malware application for identification and to exploit vulnerabilities within the android operating system. The work adopted the object-oriented analysis and design methodology (OOAD). Context diagram was used to represent data flow in the malware application and Sequence diagram was used to show the interactions between objects in the application and the sequential order that those interactions occurred. Further, a randomized algorithm was used for the detailed design. The work developed a malware application that kept track of user tasks but at the background modified contacts list causing inconveniences to the user. The malware application replaced the contact list with random strings from set of alphanumeric characters. The malware application simulated a real-world cyber threat, contacts modification, to uncover vulnerabilities that evade detection through conventional security approaches. By exploring this attack vector, the study provided empirical evidence of vulnerabilities that was exploited by the malicious application developed. This study contributed to the broader field of cyber security research by providing experimental evidence and insights into the specific vulnerabilities and attack vectors targeting Android operating system.
African Journals Online (AJOL)
Title: An experimental malware for smartphones
Description:
Android operating system has become one of the platforms developers used to introduce their malicious activities into the smartphone world through Android Applications (App).
Although the Google Play Store implements security countermeasures against Android malware, these measures have vulnerabilities.
A major weakness is that users often accept all requested permissions as mandatory when installing an application, without understanding the risks.
This gives developers the basis to achieve their illicit actions.
The aim of the study is to develop a malware application for identification and to exploit vulnerabilities within the android operating system.
The work adopted the object-oriented analysis and design methodology (OOAD).
Context diagram was used to represent data flow in the malware application and Sequence diagram was used to show the interactions between objects in the application and the sequential order that those interactions occurred.
Further, a randomized algorithm was used for the detailed design.
The work developed a malware application that kept track of user tasks but at the background modified contacts list causing inconveniences to the user.
The malware application replaced the contact list with random strings from set of alphanumeric characters.
The malware application simulated a real-world cyber threat, contacts modification, to uncover vulnerabilities that evade detection through conventional security approaches.
By exploring this attack vector, the study provided empirical evidence of vulnerabilities that was exploited by the malicious application developed.
This study contributed to the broader field of cyber security research by providing experimental evidence and insights into the specific vulnerabilities and attack vectors targeting Android operating system.
.
Related Results
AndroDex: Android Dex Images of Obfuscated Malware
AndroDex: Android Dex Images of Obfuscated Malware
AbstractWith the emergence of technology and the usage of a large number of smart devices, cyber threats are increasing. Therefore, research studies have shifted their attention to...
Android Malware Detection Techniques: A Literature Review
Android Malware Detection Techniques: A Literature Review
Objective:
This paper provides the basics of Android malware, its evolution and tools and
techniques for malware analysis. Its main aim is to present a review of the literature on ...
An optimal deep learning-based framework for the detection and classification of android malware
An optimal deep learning-based framework for the detection and classification of android malware
The use of smartphones is increasing rapidly and the malicious intrusions associated with it have become a challenging task that needs to be resolved. A secure and effective techn...
Malware Detection using Deep Learning
Malware Detection using Deep Learning
Malicious software or malware continues to pose a major security concern in this digital age as computer users, corporations, and governments witness an exponential growth in malwa...
Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable
Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable
Latar Belakang: Dua komponen utama pada analisismalware adalah analisis malware statis yang melibatkan pemeriksaan struktur dasar malware yang dapat dieksekusi tanpa mengeksekusiny...
HYBRID DEEP LEARNING EFFECTIVENESS OF IMAGE-BASED MALWARE DETECTION
HYBRID DEEP LEARNING EFFECTIVENESS OF IMAGE-BASED MALWARE DETECTION
The current high rate of malware variant production each day produces hundreds of thousands of new variants making signature detection methods ineffective. Deep learning patterns s...
Malware and their diverse characteristics related to detection and analysis: A literature survey
Malware and their diverse characteristics related to detection and analysis: A literature survey
The term malware refers to a specific form of software that causes damage to the computing device through data leakage and transformation, device malfunctioning, hacking, and explo...
A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing
A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing
<p>Android has become the dominant operating system for portable devices, making it a valuable asset that needs protection. Though Android is very popular; it has several vul...

