Skip to main content

A New System Call Classification for Android Mobile Malware Surveillance Exploitation via SMS Message

  • Conference paper
  • First Online:
Advanced Computer and Communication Engineering Technology

Abstract

Nowadays, Android has become the most widely used platform for smartphones. Due to the active used of smartphones, the floodgates of mobile malware threats are open every single day. Mobile malware harms users by illegally disable a mobile device, allowing malicious user to remotely control the device and steal personal information stored on the device. One of the surveillance features that attackers could abuse to gain those benefits is by exploiting the SMS message. Therefore, this paper introduces a new system call classification for SMS exploitation using a covering algorithm. The new system call classification can be used as a guidance to defend against mobile malware attacks. 1260 malware samples related to SMS exploitation from the Android Malware Genome Project have been analysed. The experiment was conducted using the dynamic analysis and open source tools in a controlled lab environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: IEEE Symposium on Security and Privacy (SP), pp. 95–109 (2012)

    Google Scholar 

  2. Pan, B.: Android malware exploits china mobile SMS payments. http://blog.trendmicro.com/trendlabs-security-intelligence/android-malware-exploits-china-mobile-sms-payments/. Last Accessed 28 Jan 2015

  3. Ramu, S.: Mobile malware evolution, detection and defense. EECE 571B, Term Survey Paper, April 2012, University of British Columbia (2012)

    Google Scholar 

  4. Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: Proceedings of the 16th Network and Distributed System Security Symposium, NDSS (2012)

    Google Scholar 

  5. Abdullah, Z., Saudi, M.M., Anuar, N.B.: Mobile malware detection: proof of concept. In: 3rd International Conference of Software Engineering and Computer Systems 2013 (ICSECS’13), Universiti Malaysia Pahang (2013)

    Google Scholar 

  6. Tchakounte, F., Dayang, P.: System calls analysis of malwares on android. Int. J. Sci. Technol. 2(9) (2013)

    Google Scholar 

  7. Burguera, I., Zurutuza, U.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (SPSM ’11) (2011)

    Google Scholar 

  8. Blasing, T., Batyuk, L., Schmidt, A. D., Camtepe, S. A., Albayrak, S.: An android application sandbox system for suspicious software detection. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 55–62 (2010)

    Google Scholar 

  9. Wu, D.J., Mao, C.H., Wei, T.E., Lee, H.M., & Wu, K.P.: Droidmat: android malware detection through manifest and API calls tracing. In: 2012 Seventh Asia Joint Conference on Information Security (Asia JCIS), pp. 62–69 (2012)

    Google Scholar 

  10. Wong, C. (2014). Smartphone location-based services in the social, mobile, and surveillance practices of everyday life

    Google Scholar 

  11. Techdirt. (2011). Url:https://www.techdirt.com/blog/wireless/articles/20110417/21485513927/smartphone-apps-quietly-using-phone-microphones-cameras-to-gather-data.shtml, Last Accessed 28 Jan 2015

  12. DieNet. (2014). Strace linux man page. Url:http://linux.die.net/man/1/strace. Last Accessed 28 Jan 2015

  13. Witten, I.H., Frank, E.: Data Mining Practical machine Learning Tools and Techniques, 2nd edn. (pp. 105–111) (2009)

    Google Scholar 

Download references

Acknowledgements

The authors would like to express their gratitude to Universiti Sains Islam Malaysia (USIM) and Islamic Science Institute (ISI), USIM for the support and facilities provided. This research paper is supported by Ministry of Higher Education Malaysia under FRGS grant [FRGS/1/2014/ICT04/USIM/02/1] and Universiti Sains Islam Malaysia grant [PPP/FST/SKTS/30/12712] and also [USIM/RAGS/FST/36/51013].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Madihah Mohd Saudi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Mohd Saudi, M., Abd Rahman, M.Z., Mahmud, A.A., Basir, N., Yusoff, Y.S. (2016). A New System Call Classification for Android Mobile Malware Surveillance Exploitation via SMS Message. In: Sulaiman, H., Othman, M., Othman, M., Rahim, Y., Pee, N. (eds) Advanced Computer and Communication Engineering Technology. Lecture Notes in Electrical Engineering, vol 362. Springer, Cham. https://doi.org/10.1007/978-3-319-24584-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24584-3_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24582-9

  • Online ISBN: 978-3-319-24584-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics