Mobile Root Exploit Detection based on System Events Extracted from Android Platform
نویسندگان
چکیده
Recently, the number of attacks by malicious application has significantly increased, targeting Android-platform mobile terminal such as Samsung Galaxy Note I/II and Galaxy Tab 10.1, etc. The malicious application can be distributed and installed on user’s mobile devices through open market after masquerading as a common normal application. An attacker inserts malicious code into an application, which might threaten privacy by root exploit. Once the root exploit attack is successful, malicious code can collect and steal private data stored in mobile terminal, for example, SMS messages, contacts list and public key certificate for banking. To protect the private information from the malicious exploit attack, several response mechanisms such as malicious code detection, rooting attack detection and countermeasure method are required. To meet this end, this paper investigates mobile root exploits for Android based mobile devices. Based on that, this paper proposes countermeasure system that enables to extract and collect events related to root exploit attacks occurring from mobile terminal, which contributes to active protection from malicious mobile attacks. KeywordsSmart Mobile Device, Root Exploits, Detection, Malicious Application, Kernel Event, Android Platform
منابع مشابه
Dynamic Permission Mechanism on Android
This paper discusses the implementation of protecting user's data on mobile device based on Android platform. The mobile platform surpasses computers in its popularity in many aspects of one daily routine. Protection of data is one of the basic security feature of each operating system. Android platform raise its protection with every new version of the system. This paper covers the new approac...
متن کاملAggrandizing the beast's limbs: patulous code reuse attack on ARM architecture
Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...
متن کاملMobile-Based Eye-Blink Detection Performance Analysis on Android Platform
In this article, we develop a real-time mobile phone-based gaze tracking and eye-blink detection system on Android platform. Our eye-blink detection scheme is developed based on the time difference between two open eye states. We develop our system by finding the greatest circle—pupil of an eye. So we combine the both Haar classifier and Normalized Summation of Square of Difference template-mat...
متن کاملDetection of Malware on Android based on Application Features
Threat of mobile malware is increasing day by day. Since Android is the most popular and maximum sold mobile phone, there is an increasing threat of malware on Android based mobile device. The different antimalware products available in market can detect the malware in its original form. But they cannot detect the malware after applying some form of obfuscation or transformation to the malware....
متن کاملDesign and Evaluation of a Fall Detection Algorithm on Mobile Phone Platform
The increasingly aging population will pose a severe burden to the health services. Falls are a major health risk that diminishes the quality of life among the elderly people and increases the health services cost. Reliable fall detection and notification is essential to improve the post-fall medical outcome which is largely dependent upon the response and rescue time. In this paper, we analyze...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013