Title :
Android SMS Malware: Vulnerability and Mitigation
Author :
Hamandi, K. ; Chehab, Ali ; Elhajj, I.H. ; Kayssi, Ayman
Author_Institution :
Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Beirut, Lebanon
Abstract :
In this paper, we study some messaging design decisions which resulted in a set of vulnerabilities in the Android operating system, and we demonstrate how a malware application can be built to abuse these vulnerabilities. The application presents itself as a regular SMS messaging application and uses its basic permissions to send/receive short messages. Since many operators worldwide provide services that allow users to transfer credits/units through SMS, the application abuses this service to transfer credits from users illegally. The "permission" subsystem, the "broadcast receiver" subsystem, and the message-sending mechanism contribute to forming a haven for SMS malware by granting them absolute control over sending, receiving, and hiding SMS messages. Accordingly, the malicious application hides any acknowledgments from the telecom operator that might appear after a credit transfer transaction. This enables malware to drain the balance of the attacked user and has the potential to cause damage to a large number of users as well as telecom operators. The application was demonstrated on a local operator and it successfully passed standard screening procedures that claim to catch malware. A set of possible solutions are also presented in order to mitigate the risks of such attacks.
Keywords :
electronic messaging; invasive software; operating system kernels; Android SMS malware application; Android operating system; SMS messaging application; broadcast receiver subsystem; credit transfer transaction; message sending mechanism; messaging design decision; permission subsystem; telecom operator; Databases; Mobile communication; Monitoring; Receivers; Smart phones; Trojan horses; Android; Broadcast Receiver; Malware; Permission; SMS; Vulnerability; credit transfer;
Conference_Titel :
Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on
Conference_Location :
Barcelona
Print_ISBN :
978-1-4673-6239-9
Electronic_ISBN :
978-0-7695-4952-1
DOI :
10.1109/WAINA.2013.134