Abstract
Mobile malware is ubiquitous in many malicious activities such as money stealing. Consumers are charged without their consent. This paper explores how mobile malware exploit the system calls via SMS. As a solution, we proposed a system calls classification based on surveillance exploitation system calls for SMS. The proposed system calls classification is evaluated and tested using applications from Google Play Store. This research focuses on Android operating system. The experiment was conducted using Drebin dataset which contains 5560 malware applications. Dynamic analysis was used to extract the system calls from each application in a controlled lab environment. This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. The classification has been evaluated in 500 applications and 126 applications have been identified to contain malware.
Similar content being viewed by others
References
Brook, C.: New Banking Trojan Targets Android, Steals SMS. Threat Post. https://threatpost.com/new-banking-trojan-targets-android-steals-sms/110819/. Accessed 25 Feb 2016
GData Mobile Malware Report, Threat Report: Q1/2015. https://public.gdatasoftware.com/Presse/Publikationen/Malware_Reports/G_DATA_MobileMWR_Q2_2015_US.pdf. Accessed 25 Feb 2016
Zhang, D., Kong, W.K., You, J., Wong, M.: On-line palmprint identification. In: Proceedings of IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 1041–1050. IEEE Computer Society, Washington DC (2003)
Abhijit, B., Xin, H., Kang G.S., Taejoon, P.: Behavioral detection of malware on mobile handsets. In: ACM 978-1-60558-139-2/08/06, Breckenridge (2008)
Qian, Q., Cai, J., Xie, M., Zhang, R.: Malicious behavior analysis for android applications. Int. J. Netw. Secur. 18(1), 182–192 (2015)
Octeau, D., Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., Traon, Y.L.: Combining static analysis with probabilistic models to enable market-scale android inter-component analysis. In: Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2016), pp. 469–484. ACM, New York (2016)
Park, Y., Lee, C.H., Lee, C., Lim, J.H., Han, S., Park, M., Cho, S.J.: RGBDroid: a novel response-based approach to android privilege escalation attacks. In: Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats. USENIX, Berkeley (2012)
Weichselbaum, L., Neugschwandtner, M., Lindorfer, M., Fratantonio, Y., Veen, V., Platzer, C.: Andrubis: android malware under the magnifying glass. Vienna University of Technology, Technical report TR-ISECLAB-0414-001 (2014)
Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, (Morgan Kaufmann Series in Data Management Systems), 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2005)
Acknowledgment
The authors would like to express their gratitude to Universiti Sains Islam Malaysia (USIM) and Islamic Science Institute (ISI), USIM for the support and facilities provided. This research is supported by grants [FRGS/1/2014/ICT04/USIM/02/1] and [PPP/USG-0116/FST/30/13216].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Zaizi, N.J.M., Saudi, M.M., Khailani, A. (2017). A New Mobile Malware Classification for SMS Exploitation. In: Herawan, T., Ghazali, R., Nawi, N.M., Deris, M.M. (eds) Recent Advances on Soft Computing and Data Mining. SCDM 2016. Advances in Intelligent Systems and Computing, vol 549. Springer, Cham. https://doi.org/10.1007/978-3-319-51281-5_46
Download citation
DOI: https://doi.org/10.1007/978-3-319-51281-5_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51279-2
Online ISBN: 978-3-319-51281-5
eBook Packages: EngineeringEngineering (R0)