Publication: Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
dc.Conferencecode | 123957 | |
dc.Conferencedate | 25 March 2015 through 27 March 2015 | |
dc.Conferencename | 17th UKSim-AMSS International Conference on Computer Modelling and Simulation, UKSim 2015 | |
dc.citedby | 5 | |
dc.contributor.affiliations | Faculty of Science and Technology | |
dc.contributor.affiliations | Universiti Sains Islam Malaysia (USIM) | |
dc.contributor.author | Saudi M.M. | en_US |
dc.contributor.author | Ridzuan F. | en_US |
dc.contributor.author | Basir N. | en_US |
dc.contributor.author | Nabila N.F. | en_US |
dc.contributor.author | Pitchay S.A. | en_US |
dc.contributor.author | Ahmad I.N. | en_US |
dc.date.accessioned | 2024-05-29T01:54:53Z | |
dc.date.available | 2024-05-29T01:54:53Z | |
dc.date.issued | 2016 | |
dc.description.abstract | The invention of smartphone have made life easier as it is capable of providing important functions used in user's daily life. While different operating system (OS) platform was built for smartphone, Android has become one of the most popular choice. Nonetheless, it is also the most targeted platform for mobile malware attack causing financial loss to the victims. Therefore, in this research, the exploitation on system calls in Android OS platform caused by mobile malware that could lead to financial loss were examined. The experiment was conducted in a controlled lab environment using open source tools by implementing dynamic analysis on 1260 datasets from the Android Malware Genome Project. Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. This new system call classification can be used as a reference for other researcher in the same field to secure against mobile malware attacks by exploiting call logs. In the future, this new system call classification could be used as a basis to develop a new model to detect mobile attacks exploitation via call logs. � 2015 IEEE. | |
dc.description.nature | Final | en_US |
dc.editor | Cant R.Orsoni A.Saad I.Al-Dabass D.Ibrahim Z. | en_US |
dc.identifier.ArtNo | 7576541 | |
dc.identifier.doi | 10.1109/UKSim.2015.89 | |
dc.identifier.epage | 181 | |
dc.identifier.isbn | 9781480000000 | |
dc.identifier.scopus | 2-s2.0-84991821809 | |
dc.identifier.spage | 176 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84991821809&doi=10.1109%2fUKSim.2015.89&partnerID=40&md5=89b45d99e3d3abb71d25cacf3e650b3b | |
dc.identifier.uri | https://oarep.usim.edu.my/handle/123456789/9578 | |
dc.language | English | |
dc.language.iso | en_US | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartof | Proceedings - UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, UKSim 2015 | |
dc.source | Scopus | |
dc.subject | and system call classification | en_US |
dc.subject | covering algorithm | en_US |
dc.subject | data transformation | en_US |
dc.subject | exploitation of call logs using system calls | en_US |
dc.subject | similarity analysis | en_US |
dc.subject | System calls | en_US |
dc.subject | Computer crime | en_US |
dc.subject | Intrusion detection | en_US |
dc.subject | Losses | en_US |
dc.subject | Malware | en_US |
dc.subject | Metadata | en_US |
dc.subject | Signal encoding | en_US |
dc.subject | Smartphones | en_US |
dc.subject | Android malware | en_US |
dc.subject | Covering algorithms | en_US |
dc.subject | Data transformation | en_US |
dc.subject | Genome projects | en_US |
dc.subject | Open source tools | en_US |
dc.subject | Proof of concept | en_US |
dc.subject | Similarity analysis | en_US |
dc.title | Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept | |
dc.type | Conference Paper | en_US |
dspace.entity.type | Publication |