Exploitation and Detection of a Malicious Mobile Application

dc.contributor.authorNguyen, Thanh
dc.contributor.authorMcDonald, J. Todd
dc.contributor.authorGlisson, William Bradley
dc.date.accessioned2021-09-27T17:12:18Z
dc.date.available2021-09-27T17:12:18Z
dc.date.issued2017-01
dc.descriptionA paper co-authored by William Glisson published in the Proceedings of the 50th Hawaii International Conference on System Sciences in 2017en_US
dc.description.abstractMobile devices are increasingly being embraced by both organizations and individuals in today’s society. Specifically, Android devices have been the prominent mobile device OS for several years. This continued amalgamation creates an environment that is an attractive attack target. The heightened integration of these devices prompts an investigation into the viability of maintaining non-compromised devices. Hence, this research presents a preliminary investigation into the effectiveness of current commercial anti-virus, static code analysis and dynamic code analysis engines in detecting unknown repackaged malware piggybacking on popular applications with excessive permissions. The contribution of this paper is two-fold. First, it provides an initial assessment of the effectiveness of anti-virus and analysis tools in detecting malicious applications and behavior in Android devices. Secondly, it provides process for inserting code injection attacks to stimulate a zero-day repackaged malware that can be used in future research efforts.en_US
dc.identifier.citationNguyen, T., McDonald, J. T., & Glisson, W. B. (2017). Exploitation and Detection of a Malicious Mobile Application. Proceedings of the 50th Hawaii International Conference on System Sciences (2017). Hawaii International Conference on System Sciences, p. 6181-6190. https://doi.org/10.24251/hicss.2017.747en_US
dc.identifier.urihttps://hdl.handle.net/20.500.11875/3207
dc.publisherProceedings of the 50th Hawaii International Conference on System Sciencesen_US
dc.subjectandroiden_US
dc.subjectCode Injectionen_US
dc.subjectMalware analysisen_US
dc.subjectsmartphone securityen_US
dc.titleExploitation and Detection of a Malicious Mobile Applicationen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Exploitation and detection of malicious_OCR.pdf
Size:
580.9 KB
Format:
Adobe Portable Document Format
Description:
Article

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.63 KB
Format:
Item-specific license agreed upon to submission
Description: