• DocumentCode
    614095
  • Title

    Android SMS Malware: Vulnerability and Mitigation

  • Author

    Hamandi, K. ; Chehab, Ali ; Elhajj, I.H. ; Kayssi, Ayman

  • Author_Institution
    Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Beirut, Lebanon
  • fYear
    2013
  • fDate
    25-28 March 2013
  • Firstpage
    1004
  • Lastpage
    1009
  • Abstract
    In this paper, we study some messaging design decisions which resulted in a set of vulnerabilities in the Android operating system, and we demonstrate how a malware application can be built to abuse these vulnerabilities. The application presents itself as a regular SMS messaging application and uses its basic permissions to send/receive short messages. Since many operators worldwide provide services that allow users to transfer credits/units through SMS, the application abuses this service to transfer credits from users illegally. The "permission" subsystem, the "broadcast receiver" subsystem, and the message-sending mechanism contribute to forming a haven for SMS malware by granting them absolute control over sending, receiving, and hiding SMS messages. Accordingly, the malicious application hides any acknowledgments from the telecom operator that might appear after a credit transfer transaction. This enables malware to drain the balance of the attacked user and has the potential to cause damage to a large number of users as well as telecom operators. The application was demonstrated on a local operator and it successfully passed standard screening procedures that claim to catch malware. A set of possible solutions are also presented in order to mitigate the risks of such attacks.
  • Keywords
    electronic messaging; invasive software; operating system kernels; Android SMS malware application; Android operating system; SMS messaging application; broadcast receiver subsystem; credit transfer transaction; message sending mechanism; messaging design decision; permission subsystem; telecom operator; Databases; Mobile communication; Monitoring; Receivers; Smart phones; Trojan horses; Android; Broadcast Receiver; Malware; Permission; SMS; Vulnerability; credit transfer;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on
  • Conference_Location
    Barcelona
  • Print_ISBN
    978-1-4673-6239-9
  • Electronic_ISBN
    978-0-7695-4952-1
  • Type

    conf

  • DOI
    10.1109/WAINA.2013.134
  • Filename
    6550526