Abstract
Nowadays, Android has become the most widely used platform for smartphones. Due to the active used of smartphones, the floodgates of mobile malware threats are open every single day. Mobile malware harms users by illegally disable a mobile device, allowing malicious user to remotely control the device and steal personal information stored on the device. One of the surveillance features that attackers could abuse to gain those benefits is by exploiting the SMS message. Therefore, this paper introduces a new system call classification for SMS exploitation using a covering algorithm. The new system call classification can be used as a guidance to defend against mobile malware attacks. 1260 malware samples related to SMS exploitation from the Android Malware Genome Project have been analysed. The experiment was conducted using the dynamic analysis and open source tools in a controlled lab environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: IEEE Symposium on Security and Privacy (SP), pp. 95–109 (2012)
Pan, B.: Android malware exploits china mobile SMS payments. http://blog.trendmicro.com/trendlabs-security-intelligence/android-malware-exploits-china-mobile-sms-payments/. Last Accessed 28 Jan 2015
Ramu, S.: Mobile malware evolution, detection and defense. EECE 571B, Term Survey Paper, April 2012, University of British Columbia (2012)
Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: Proceedings of the 16th Network and Distributed System Security Symposium, NDSS (2012)
Abdullah, Z., Saudi, M.M., Anuar, N.B.: Mobile malware detection: proof of concept. In: 3rd International Conference of Software Engineering and Computer Systems 2013 (ICSECS’13), Universiti Malaysia Pahang (2013)
Tchakounte, F., Dayang, P.: System calls analysis of malwares on android. Int. J. Sci. Technol. 2(9) (2013)
Burguera, I., Zurutuza, U.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (SPSM ’11) (2011)
Blasing, T., Batyuk, L., Schmidt, A. D., Camtepe, S. A., Albayrak, S.: An android application sandbox system for suspicious software detection. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 55–62 (2010)
Wu, D.J., Mao, C.H., Wei, T.E., Lee, H.M., & Wu, K.P.: Droidmat: android malware detection through manifest and API calls tracing. In: 2012 Seventh Asia Joint Conference on Information Security (Asia JCIS), pp. 62–69 (2012)
Wong, C. (2014). Smartphone location-based services in the social, mobile, and surveillance practices of everyday life
Techdirt. (2011). Url:https://www.techdirt.com/blog/wireless/articles/20110417/21485513927/smartphone-apps-quietly-using-phone-microphones-cameras-to-gather-data.shtml, Last Accessed 28 Jan 2015
DieNet. (2014). Strace linux man page. Url:http://linux.die.net/man/1/strace. Last Accessed 28 Jan 2015
Witten, I.H., Frank, E.: Data Mining Practical machine Learning Tools and Techniques, 2nd edn. (pp. 105–111) (2009)
Acknowledgements
The authors would like to express their gratitude to Universiti Sains Islam Malaysia (USIM) and Islamic Science Institute (ISI), USIM for the support and facilities provided. This research paper is supported by Ministry of Higher Education Malaysia under FRGS grant [FRGS/1/2014/ICT04/USIM/02/1] and Universiti Sains Islam Malaysia grant [PPP/FST/SKTS/30/12712] and also [USIM/RAGS/FST/36/51013].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Mohd Saudi, M., Abd Rahman, M.Z., Mahmud, A.A., Basir, N., Yusoff, Y.S. (2016). A New System Call Classification for Android Mobile Malware Surveillance Exploitation via SMS Message. In: Sulaiman, H., Othman, M., Othman, M., Rahim, Y., Pee, N. (eds) Advanced Computer and Communication Engineering Technology. Lecture Notes in Electrical Engineering, vol 362. Springer, Cham. https://doi.org/10.1007/978-3-319-24584-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-24584-3_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24582-9
Online ISBN: 978-3-319-24584-3
eBook Packages: EngineeringEngineering (R0)