Skip to main content

A New Mobile Malware Classification for SMS Exploitation

  • Conference paper
  • First Online:
Recent Advances on Soft Computing and Data Mining (SCDM 2016)

Abstract

Mobile malware is ubiquitous in many malicious activities such as money stealing. Consumers are charged without their consent. This paper explores how mobile malware exploit the system calls via SMS. As a solution, we proposed a system calls classification based on surveillance exploitation system calls for SMS. The proposed system calls classification is evaluated and tested using applications from Google Play Store. This research focuses on Android operating system. The experiment was conducted using Drebin dataset which contains 5560 malware applications. Dynamic analysis was used to extract the system calls from each application in a controlled lab environment. This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. The classification has been evaluated in 500 applications and 126 applications have been identified to contain malware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Brook, C.: New Banking Trojan Targets Android, Steals SMS. Threat Post. https://threatpost.com/new-banking-trojan-targets-android-steals-sms/110819/. Accessed 25 Feb 2016

  2. GData Mobile Malware Report, Threat Report: Q1/2015. https://public.gdatasoftware.com/Presse/Publikationen/Malware_Reports/G_DATA_MobileMWR_Q2_2015_US.pdf. Accessed 25 Feb 2016

  3. Zhang, D., Kong, W.K., You, J., Wong, M.: On-line palmprint identification. In: Proceedings of IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 1041–1050. IEEE Computer Society, Washington DC (2003)

    Google Scholar 

  4. Abhijit, B., Xin, H., Kang G.S., Taejoon, P.: Behavioral detection of malware on mobile handsets. In: ACM 978-1-60558-139-2/08/06, Breckenridge (2008)

    Google Scholar 

  5. Qian, Q., Cai, J., Xie, M., Zhang, R.: Malicious behavior analysis for android applications. Int. J. Netw. Secur. 18(1), 182–192 (2015)

    Google Scholar 

  6. Octeau, D., Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., Traon, Y.L.: Combining static analysis with probabilistic models to enable market-scale android inter-component analysis. In: Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2016), pp. 469–484. ACM, New York (2016)

    Google Scholar 

  7. Park, Y., Lee, C.H., Lee, C., Lim, J.H., Han, S., Park, M., Cho, S.J.: RGBDroid: a novel response-based approach to android privilege escalation attacks. In: Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats. USENIX, Berkeley (2012)

    Google Scholar 

  8. Weichselbaum, L., Neugschwandtner, M., Lindorfer, M., Fratantonio, Y., Veen, V., Platzer, C.: Andrubis: android malware under the magnifying glass. Vienna University of Technology, Technical report TR-ISECLAB-0414-001 (2014)

    Google Scholar 

  9. Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, (Morgan Kaufmann Series in Data Management Systems), 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2005)

    MATH  Google Scholar 

Download references

Acknowledgment

The authors would like to express their gratitude to Universiti Sains Islam Malaysia (USIM) and Islamic Science Institute (ISI), USIM for the support and facilities provided. This research is supported by grants [FRGS/1/2014/ICT04/USIM/02/1] and [PPP/USG-0116/FST/30/13216].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nurzi Juana Mohd Zaizi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Zaizi, N.J.M., Saudi, M.M., Khailani, A. (2017). A New Mobile Malware Classification for SMS Exploitation. In: Herawan, T., Ghazali, R., Nawi, N.M., Deris, M.M. (eds) Recent Advances on Soft Computing and Data Mining. SCDM 2016. Advances in Intelligent Systems and Computing, vol 549. Springer, Cham. https://doi.org/10.1007/978-3-319-51281-5_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51281-5_46

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51279-2

  • Online ISBN: 978-3-319-51281-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics