Hashim H.A.-B.Saudi M.M.Basir N.2024-05-292024-05-29201697833200000001876110010.1007/978-3-319-24584-3_112-s2.0-84955442965https://www.scopus.com/inward/record.uri?eid=2-s2.0-84955442965&doi=10.1007%2f978-3-319-24584-3_11&partnerID=40&md5=57d3ea2831665b1b2a469b4269ca2477https://oarep.usim.edu.my/handle/123456789/9620Nowadays, mobile botnet has become as one of the most dangerous threats for smartphone. It has the capabilities of committing many criminal activities, such as remote access, Denial of Service (DoS), phishing, spreading malwares, stealing information and building mobile devices for illegitimate exchange of information and it is crucial to have an efficient mobile botnet detection mechanism. Therefore, this research paper presents a systematic review analysis of root exploitation for mobile botnet detection and a proof of concept how the mobile botnet attacks. This proof of concept includes analysis of mobile botnet sample using reverse engineering technique and static analysis. � Springer International Publishing Switzerland 2016.en-USAndroidMobile botnetReverse engineeringRoot exploitationDenial-of-service attackMobile devicesMobile securityMobile telecommunication systemsReverse engineeringStatic analysisAndroidBotnet detectionsCriminal activitiesExchange of informationMobile botnetReverse engineering techniquesRoot exploitationSystematic ReviewMalwareA systematic review analysis of root exploitation for mobile botnet detectionConference Paper113122362