Publication:
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept

dc.ConferencecodeUK Simulat Soc, Asia Modelling & Simulat Sect, IEEE, IEEE Comp Soc UK & RI Sect, IEEE Reg 8, European Federat Simulat Soc, European Council Modelling & Simulat, Kingston Univ, Imperial Coll, Machine Intelligence Res Labs, Norwegian Univ Sci & Technol, Nottingham Trent Univ, Univ Technol Malaysia, Univ Sci Malaysia, Univ Malaysia Sabah, Univ Malaysia Perlis, Univ Malaysia Pahang, Univ Technol Mara, IEEE UK & RI, IEEE Reg 10, IEEE Comp Soc
dc.ConferencedateMAR 25-27, 2015
dc.ConferencelocationEmmanuel Coll, Cambridge, ENGLAND
dc.Conferencename17th IEEE UKSim-AMSS International Conference on Computer Modelling and Simulation (UKSim)
dc.contributor.authorSaudi, MMen_US
dc.contributor.authorRidzuan, Fen_US
dc.contributor.authorBasir, Nen_US
dc.contributor.authorNabila, NFen_US
dc.contributor.authorPitchay, SAen_US
dc.contributor.authorAhmad, INen_US
dc.date.accessioned2024-05-29T02:50:35Z
dc.date.available2024-05-29T02:50:35Z
dc.date.issued2015
dc.description.abstractThe invention of smartphone have made life easier as it is capable of providing important functions used in user's daily life. While different operating system (OS) platform was built for smartphone, Android has become one of the most popular choice. Nonetheless, it is also the most targeted platform for mobile malware attack causing financial loss to the victims. Therefore, in this research, the exploitation on system calls in Android OS platform caused by mobile malware that could lead to financial loss were examined. The experiment was conducted in a controlled lab environment using open source tools by implementing dynamic analysis on 1260 datasets from the Android Malware Genome Project. Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. This new system call classification can be used as a reference for other researcher in the same field to secure against mobile malware attacks by exploiting call logs. In the future, this new system call classification could be used as a basis to develop a new model to detect mobile attacks exploitation via call logs.
dc.identifier.doi10.1109/UKSim.2015.89
dc.identifier.epage181
dc.identifier.issn2381-4772
dc.identifier.scopusWOS:000411860000021
dc.identifier.spage176
dc.identifier.urihttps://oarep.usim.edu.my/handle/123456789/11083
dc.languageEnglish
dc.language.isoen_US
dc.publisherIEEEen_US
dc.relation.ispartof2015 17th UKSIM-AMSS International Conference On Computer Modelling And Simulation (UKSIM)
dc.sourceWeb Of Science (ISI)
dc.subjectsystem callsen_US
dc.subjectsimilarity analysisen_US
dc.subjectexploitation of call logs using system callsen_US
dc.subjectcovering algorithmen_US
dc.subjectdata transformationen_US
dc.subjectand system call classificationen_US
dc.titleAndroid Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
dc.typeProceedings Paperen_US
dspace.entity.typePublication

Files