Publication: A new mobile malware classification for SMS exploitation
dc.Conferencecode | 188139 | |
dc.Conferencedate | 18 August 2016 through 20 August 2016 | |
dc.Conferencename | The 2nd International Conference on Soft Computing and Data Mining, SCDM-2016 | |
dc.contributor.affiliations | Faculty of Science and Technology | |
dc.contributor.affiliations | Universiti Sains Islam Malaysia (USIM) | |
dc.contributor.author | Zaizi N.J.M. | en_US |
dc.contributor.author | Saudi M.M. | en_US |
dc.contributor.author | Khailani A. | en_US |
dc.date.accessioned | 2024-05-29T01:55:58Z | |
dc.date.available | 2024-05-29T01:55:58Z | |
dc.date.issued | 2017 | |
dc.description.abstract | Mobile malware is ubiquitous in many malicious activities such as money stealing. Consumers are charged without their consent. This paper explores how mobile malware exploit the system calls via SMS. As a solution, we proposed a system calls classification based on surveillance exploitation system calls for SMS. The proposed system calls classification is evaluated and tested using applications from Google Play Store. This research focuses on Android operating system. The experiment was conducted using Drebin dataset which contains 5560 malware applications. Dynamic analysis was used to extract the system calls from each application in a controlled lab environment. This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. The classification has been evaluated in 500 applications and 126 applications have been identified to contain malware. � Springer International Publishing AG 2017. | |
dc.description.nature | Final | en_US |
dc.description.sponsorship | Ilham Perdana Telkom University, Indonesia | |
dc.description.sponsorship | Luthfi Ramadani Telkom University, Indonesia | |
dc.description.sponsorship | Nur Ichsan Utama Telkom University, Indonesia | |
dc.description.sponsorship | Umar Yunan Telkom University, Indonesia | |
dc.editor | Ghazali R.Nawi N.M.Deris M.M.Herawan T. | en_US |
dc.identifier.doi | 10.1007/978-3-319-51281-5_46 | |
dc.identifier.epage | 464 | |
dc.identifier.isbn | 9783320000000 | |
dc.identifier.issn | 21945357 | |
dc.identifier.scopus | 2-s2.0-85009774247 | |
dc.identifier.spage | 456 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85009774247&doi=10.1007%2f978-3-319-51281-5_46&partnerID=40&md5=605b8afc6af569866232e2225c0c890c | |
dc.identifier.uri | https://oarep.usim.edu.my/handle/123456789/9781 | |
dc.identifier.volume | 549 AISC | |
dc.language | English | |
dc.language.iso | en_US | |
dc.publisher | Springer Verlag | en_US |
dc.relation.ispartof | Advances in Intelligent Systems and Computing | |
dc.source | Scopus | |
dc.subject | Android | en_US |
dc.subject | Big data | en_US |
dc.subject | Covering algorithm | en_US |
dc.subject | Data classification | en_US |
dc.subject | Mobile malware | en_US |
dc.subject | Android (operating system) | en_US |
dc.subject | Big data | en_US |
dc.subject | Classification (of information) | en_US |
dc.subject | Computer crime | en_US |
dc.subject | Malware | en_US |
dc.subject | Soft computing | en_US |
dc.subject | Android | en_US |
dc.subject | Android smartphone | en_US |
dc.subject | Covering algorithms | en_US |
dc.subject | Data classification | en_US |
dc.subject | Google plays | en_US |
dc.subject | Malicious activities | en_US |
dc.subject | Mobile malware | en_US |
dc.subject | Research focus | en_US |
dc.subject | Data mining | en_US |
dc.title | A new mobile malware classification for SMS exploitation | |
dc.type | Conference Paper | en_US |
dspace.entity.type | Publication |