DocumentCode :
238729
Title :
Dissecting SMS malwares in android
Author :
Babu, Anoop Joseph ; Raveendranath, Rahul ; Rajamani, Venkiteswaran ; Datta, Soumya Kanti
Author_Institution :
Coll. of Eng. Trivandrum, Trivandrum, India
fYear :
2014
fDate :
27-29 Nov. 2014
Firstpage :
1065
Lastpage :
1069
Abstract :
Android is the most widely used operating system which spans variety of smartphones, tablets and wearable devices. Since it is open source, developers can take full advantage of the extensive number of APIs in the framework. But the popularity and openness of the android made it a favorite target of malware authors. This paper focuses on the impact of some design decisions in framework which contributes in making Android applications vulnerable. A proof of concept SMS malware is presented to analyze the working of most threatening SMS malwares in the wild. This malware sends service messages to telecom operators and incurs charges or transfer of funds. It uses the vulnerability in ordered broadcast intent system to remains stealthy by intercepting and aborting possible notifications from telecom operators. Countermeasures to mitigate this security leaks are also discussed.
Keywords :
Android (operating system); electronic messaging; invasive software; mobile computing; Android operating system; SMS malwares; ordered broadcast intent system; security leaks; service messages; Androids; Humanoid robots; Malware; Mobile communication; Receivers; Smart phones; Android; Countermeasures; Permissions; SMS Malware; Security threats;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Contemporary Computing and Informatics (IC3I), 2014 International Conference on
Conference_Location :
Mysore
Type :
conf
DOI :
10.1109/IC3I.2014.7019718
Filename :
7019718
Link To Document :
بازگشت