Mobile Security and Privacy: Advances, Challenges And

Total Page:16

File Type:pdf, Size:1020Kb

Mobile Security and Privacy: Advances, Challenges And MOBILE SECURITY AND PRIVACY MOBILE SECURITY AND PRIVACY Advances, Challenges and Future Research Directions Edited by Man Ho Au Kim-Kwang Raymond Choo Gary Kessler, Technical Editor AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Syngress is an Imprint of Elsevier Syngress is an imprint of Elsevier 50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States © 2017 Elsevier Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility. To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein. Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the Library of Congress British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library ISBN: 978-0-12-804629-6 For information on all Syngress publications visit our website at https://www.elsevier.com/ Publisher: Todd Green Acquisition Editor: Chris Katsaropoulos Editorial Project Manager: Anna Valutkevich Production Project Manager: Punithavathy Govindaradjane Cover Designer: Mark Rogers Typeset by SPi Global, India Contributors M.H. Au The Hong Kong Polytechnic Univer- D.Y.W. Liu The Hong Kong Polytechnic Uni- sity, Kowloon, Hong Kong versity, Kowloon, Hong Kong C. Chia University of Melbourne, Melbourne, L. Lo Iacono Cologne University of Applied Sci- VIC, Australia ences, Cologne, Germany K.-K.R. Choo University of Texas at San X. Lu The Hong Kong Polytechnic University, Antonio, San Antonio, TX, United States; Uni- Kowloon, Hong Kong versity of South Australia, Adelaide, SA, X.P. Luo The Hong Kong Polytechnic Univer- Australia sity, Kowloon, Hong Kong K.-P. Chow The University of Hong Kong, Y. Mohanraj Chennai, TN, India HKSAR, China H.V. Nguyen Cologne University of Applied J. Fang Jinan University, Guangzhou, China Sciences, Cologne, Germany D. Fehrenbacher Monash University, Melbourne, F. Schiliro University of South Australia, VIC, Australia Adelaide, SA, Australia F. Hayata University of Ngaoundéré, Ngaoundéré, F. Tchakounté University of Ngaoundéré, Cameroon Ngaoundéré, Cameroon L.C.K. Hui The University of Hong Kong, S. Tully Sydney, NSW, Australia HKSAR, China J. Walls University of South Australia, Z.L. Jiang Harbin Institute of Technology Shen- Adelaide, SA, Australia zhen Graduate School, Shenzhen, China Y. Xie Xiamen University, Fujian, China L. Lau Asia Pacific Association of Technology G.Z. Xue Xiamen University, Fujian, China and Society (APATAS), Hong Kong Special Administrative Region S.-M. Yiu The University of Hong Kong, HKSAR, China X. Li Chinese Academy of Sciences, Beijing, China L. Yu The Hong Kong Polytechnic University, Kowloon, Hong Kong S. Li Jinan University, Guangzhou, China vii About the Editors Man Ho Allen Au received bachelor's of the Journal of Information Security and and master's degrees from the Department Applications, Elsevier. He has served as a of Information Engineering, Chinese guest editor for various journals including University of Hong Kong, in 2003 and 2005 Future Generation Computer Systems, Elsevier, respectively, and a PhD from the University and Concurrency and Computation: Practice of Wollongong, Australia, in 2009. Currently, and Experience, Wiley. he is an assistant professor at the Dept. Kim-Kwang Raymond Choo currently of Computing, Hong Kong Polytechnic holds the Cloud Technology Endowed University. Before moving to Hong Kong Professorship at the University of Texas at in Jul. 2014, he was been a lecturer at the San Antonio, and is an associate professor School of Computer Science and Software at the University of South Australia, and Engineering, University of Wollongong, a guest professor at the China University Australia. of Geosciences. He has been an invited Dr. Au's research interests include in- speaker for a number of events, such as the formation security and privacy, applied 2011 UNODC-ITU Asia-Pacific Regional cryptography, accountable anonymity, and Workshop on Fighting Cybercrime, cloud computing. He has published over the Korean (Government) Institute of 90 papers in those areas in journals such as Criminology (2013), the UNAFEI and IEEE Transactions on Information Forensics UAE Government conference in 2014, and and Security, IEEE Transactions on Knowledge the World Internet Conference (Wuzhen and Data Engineering, ACM Transaction on Summit) in 2014, jointly organized by Information and System Security and interna- the Cyberspace Administration of China tional conferences including the Network and the People's Government of Zhejiang and Distributed System Security Symposium Province. He has also been a Keynote/ (NDSS) and the ACM Conference on Plenary Speaker at conferences, such as Computer and Communications Security the SERENE-RISC Spring 2016 Workshop, (CCS). His work has received various awards, the IEEE International Conference on Data including the ACISP 2016 Best Paper Award Science and Data Intensive Systems (DSDIS and runner-up for a PET award in 2009 for 2015), and those organized by Infocomm Outstanding Research in Privacy Enhancing Development Authority of Singapore, Technologies. A*Star, Nanyang Technological University, He has served as a program committee Singapore Management University member for over 30 international confer- (2015), the Cloud Security Alliance New ences and workshops. He is also a program Zealand (2015), CSO Australia and Trend committee co-chair of the 8th International Micro (2015), the Anti-Phishing Working Conference on Network and System Security Group (2014), the National Taiwan and the 9th International Conference on University of Science and Technology (2014), Provable Security. He is an associate editor the Asia Pacific University of Technology & ix x ABOUT THE EDITORS Innovation (Malaysia; 2014), the Nanyang various awards, including the ESORICS Technological University (Singapore; 2011), 2015 Best Research Paper Award, the Highly and National Chiayi University (Taiwan; Commended Award from Australia New 2010), and he has been an Invited Expert Zealand Policing Advisory Agency in 2014, at UNAFEI Criminal Justice Training in a Fulbright Scholarship in 2009, a British 2015, at the INTERPOL Cyber Research Computer Society's Wilkes Award in 2008, Agenda Workshop 2015, and at the Taiwan and the 2008 Australia Day Achievement Ministry of Justice Investigation Bureau's Medallion, and was on the winning team 2015 International Symposium on Regional in Germany's University of Erlangen- Security and Transnational Crimes. He was Nuremberg (FAU) Digital Forensics Research named one of the 10 Emerging Leaders in Challenge in 2015. He is also a Fellow of the the Innovation category of The Weekend Australian Computer Society, and a senior Australian Magazine/Microsoft's Next member of the IEEE. 100 series in 2009, and is the recipient of CHAPTER 1 Mobile Security and Privacy M.H. Au*, K.-K.R. Choo†,‡ *The Hong Kong Polytechnic University, Kowloon, Hong Kong †University of Texas at San Antonio, San Antonio, TX, United States ‡University of South Australia, Adelaide, SA, Australia 1 INTRODUCTION Security and privacy are highly dynamic and fast-paced research areas due to rapid tech- nological advancements. Mobile security and privacy are no exception. For example, 10 or 15 years ago, research in mobile security was mainly concerned about securing the Global System for Mobile Communications (GSM) network and communications (Jøsang and Sanderud, 2003). Since mobile phones become user programmable (i.e., the device supports third-party software), the scope for security and privacy research extends to studying the security of such third-party software and associated privacy risks (La Polla et al., 2013) (e.g., whether third-party software will result in the leakage of user data). It is also in the user's interest to ensure both confidentiality and integrity of the data that is stored on and made accessible via these devices. This is the focus of this book. Specifically, in this book, we will be presenting the state-of-the-art advances
Recommended publications
  • Éric FREYSSINET Lutte Contre Les Botnets
    THÈSE DE DOCTORAT DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Spécialité Informatique École doctorale Informatique, Télécommunications et Électronique (Paris) Présentée par Éric FREYSSINET Pour obtenir le grade de DOCTEUR DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Sujet de la thèse : Lutte contre les botnets : analyse et stratégie Présentée et soutenue publiquement le 12 novembre 2015 devant le jury composé de : Rapporteurs : M. Jean-Yves Marion Professeur, Université de Lorraine M. Ludovic Mé Enseignant-chercheur, CentraleSupélec Directeurs : M. David Naccache Professeur, École normale supérieure de thèse M. Matthieu Latapy Directeur de recherche, UPMC, LIP6 Examinateurs : Mme Clémence Magnien Directrice de recherche, UPMC, LIP6 Mme Solange Ghernaouti-Hélie Professeure, Université de Lausanne M. Vincent Nicomette Professeur, INSA Toulouse Cette thèse est dédiée à M. Celui qui n’empêche pas un crime alors qu’il le pourrait s’en rend complice. — Sénèque Remerciements Je tiens à remercier mes deux directeurs de thèse. David Naccache, officier de réserve de la gendarmerie, contribue au développement de la recherche au sein de notre institution en poussant des personnels jeunes et un peu moins jeunes à poursuivre leur passion dans le cadre académique qui s’impose. Matthieu Latapy, du LIP6, avec qui nous avions pu échanger autour d’une thèse qu’il encadrait dans le domaine difficile des atteintes aux mineurs sur Internet et qui a accepté de m’accueillir dans son équipe. Je voudrais remercier aussi, l’ensemble de l’équipe Réseaux Complexes du LIP6 et sa responsable d’équipe actuelle, Clémence Magnien, qui m’ont accueilli à bras ouverts, accom- pagné à chaque étape et dont j’ai pu découvrir les thématiques et les méthodes de travail au fil des rencontres et des discussions.
    [Show full text]
  • Universidad Carlos Iii De Madrid Signal Processing
    UNIVERSIDAD CARLOS III DE MADRID ESCUELA POLITÉCNICA SUPERIOR BACHELOR THESIS SIGNAL PROCESSING FOR MALWARE ANALYSIS Computer Engineering Department AUTHOR: Raquel Tabuyo Benito TUTOR: Pedro Peris Lopez June, 2016 Bachelor Thesis. Signal Processing for Malware Analysis “Perseverance is not a long race. It is many short races one aftr te oter” -Walter Elliot - Page .2 of 134. - Bachelor Thesis. Signal Processing for Malware Analysis Acknowledgements To my whole family, specially my sister, for whom I have an unconditionally love. I am really grateful for their dedication, patience, support and encouragement to follow my dreams. To Pedro, my Bachelor Thesis tutor, whose kindness and guidance have helped me during this wonderful trip. To my friends, thank you very much for showing me the meaning of true friendship. Without all of you, this would have never been possible. - Page .3 of 134. - Bachelor Thesis. Signal Processing for Malware Analysis Abstract This Project is an experimental analysis of Android malware through images. The analysis is based on classifying the malware into families or differentiating between goodware and malware. This analysis has been done considering two approaches. These two approaches have a common starting point, which is the transformation of Android applications into PNG images. After this conversion, the first approach was subtracting each image from the testing set with the images of the training set, in order to establish which unknown malware belongs to a specific family or to distinguish between goodware and malware. Although the accuracy was higher than the one defined in the requirements, this approach was a time consuming task, so we consider another approach to reduce the time and get the same or better accuracy.
    [Show full text]
  • Cybercrime Hits the Unexpected
    TrendLabsSM 1Q 2014 Security Roundup Cybercrime Hits the Unexpected Bitcoin- and PoS-System-Related Attacks Trouble Users Distributed by: TREND MICRO | TrendLabs 1Q 2014 Security Roundup TREND MICRO | TrendLabs 1Q 2014 Security Roundup Contents It gives me immense pleasure to share this report, developed by Trend Micro and distributed by ITU based on our fruitful partnership. This report is part of ITU’s overall support to its 193 Member States within the framework of the Global Cybersecurity Agenda. This is clear result of our partnership with Private Sector in our effort to tackle this growing Global phenomenon. 1 | Cybercrime and the Cybercriminal Underground These efforts are aimed at equipping Member States with information on the latest cybersecurity threats and corresponding counter-measures, and eventually contribute to the creation of a safe and secure cyberspace for consumers, businesses and youth everywhere. This Trend Micro quarterly report underlines the existing and emerging malicious cyber activities observed during the first quarter of 2014. Some highlights of this 10 | Mobile Threat Landscape report: • Cybercriminals are continuing to innovate and create new ways to commit digital crimes. Crypto-currency exchanges and wallets are being compromised for the purpose of theft. In addition, online banking malware are being enhanced with new technologies to exact the maximum damage. 15 | Targeted Attack Campaigns • With the exponential growth in the mobile industry, cyber-criminals are and Cyber Attacks increasingly targeting mobile devices. There is a proliferation of maliciously tampered and re-packaged apps that circumvent the security firewalls in mobile devices. • We are also witnessing cases of attacks directly aimed at organizations that rely on specific Point of Sales (Pos) systems features.
    [Show full text]
  • The Malware Book 2016
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/305469492 Handbook of Malware 2016 - A Wikipedia Book Book · July 2016 DOI: 10.13140/RG.2.1.5039.5122 CITATIONS READS 0 13,014 2 authors, including: Reiner Creutzburg Brandenburg University of Applied Sciences 489 PUBLICATIONS 472 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: NDT CE – Assessment of structures || ZfPBau – ZfPStatik View project 14. Nachwuchswissenschaftlerkonferenz Ost- und Mitteldeutscher Fachhochschulen (NWK 14) View project All content following this page was uploaded by Reiner Creutzburg on 20 July 2016. The user has requested enhancement of the downloaded file. Handbook of Malware 2016 A Wikipedia Book By Wikipedians Edited by: Reiner Creutzburg Technische Hochschule Brandenburg Fachbereich Informatik und Medien PF 2132 D-14737 Brandenburg Germany Email: [email protected] Contents 1 Malware - Introduction 1 1.1 Malware .................................................. 1 1.1.1 Purposes ............................................. 1 1.1.2 Proliferation ........................................... 2 1.1.3 Infectious malware: viruses and worms ............................. 3 1.1.4 Concealment: Viruses, trojan horses, rootkits, backdoors and evasion .............. 3 1.1.5 Vulnerability to malware ..................................... 4 1.1.6 Anti-malware strategies ..................................... 5 1.1.7 Grayware ............................................
    [Show full text]
  • Formalization of Neural Network Applications to Secure 3D Mobile Applications Paul Irolla
    Formalization of Neural Network Applications to Secure 3D Mobile Applications Paul Irolla To cite this version: Paul Irolla. Formalization of Neural Network Applications to Secure 3D Mobile Applications. Quanti- tative Methods [q-bio.QM]. Université Paris Saclay (COmUE), 2018. English. NNT : 2018SACLS585. tel-02047792 HAL Id: tel-02047792 https://tel.archives-ouvertes.fr/tel-02047792 Submitted on 25 Feb 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Formalization of neural 2018SACLS585 network to secure 3D NNT: mobile applications Thèse de doctorat de l’Université Paris-Saclay préparée à l’Université Paris-Sud École doctorale n± 568 Biosigne Spécialité de doctorat: innovation technologique Thèse présentée et soutenue a l’ESIEA Laval, le 19 décembre 2018, par Paul Irolla Composition du jury: Éric Filiol Directeur de recherche — Laboratoire CNS Directeur de thèse Jean-Philippe Deslys Directeur de recherche — Laboratoire CEA/DRF/iMETI/SEPIA Co-directeur de thèse Ludovic Apvrille Professeur — Laboratoire LabSoC (Telecom ParisTech) Rapporteur Antonella Santone Professeur — Università degli Studi del Molise Rapporteur Maroun Chamoun Professeur — Université Saint-Joseph (Beyrouth) Président Akka Zemmari Maître de conférences — Laboratoire LaBRI (CNRS) Examinateur Thèse de doctorat Thèse Titre: Formalisation et applications des réseaux de neurones à la sécurisation d’applications mobiles 3D.
    [Show full text]
  • Analysis and Classification of Android Malware
    Analysis and Classification of Android Malware Kimberly Kim-Chi Tam Information Security Department Royal Holloway, University of London A thesis submitted for the degree of Doctor of Philosophy 2016 Acknowledgements First I would like to acknowledge my supervisor and advisor, Dr. Lorenzo Cavallaro and Professor Cid Carlos, for the amazing opportunity to do my PhD at Royal Holloway University of London. It would not have been possible without you two. I would also like to acknowledge my fellow Royal Holloway University of London lab members and external collaborators for their partnership in collaborative work. In particular I would like to thank Salahuddin Khan for his technical expertise, his professionalism, and his friendship. Similarly, I feel much gratitude towards Professor Kevin Jones and Dr. War- rick Cooke for their extensive advice for both fine-tuning this thesis in detail and the overall story and flow. Parts of this research was funded by UK EPSRC grant EP/L022710/1. I would also like to thank Hewlett-Packard in Bristol for the internship op- portunity during my PhD as well as all of their support since then. Finally, I want to acknowledge my family and friends scattered across the globe. Organizing opportunities to connect has been a real challenge over the last few years, but we always managed it. So thank you all for the fun and help throughout the good times and bad. I could not have gotten this far without your awesomeness. “One does not discover new lands without consenting to lose sight of the shore for a very long time.” Andre Gide 2 Abstract With the integration of mobile devices into our daily lives, smartphones are privy to increasing amounts of sensitive information.
    [Show full text]
  • Security and Privacy of Users' Personal Information on Smartphones
    Security and Privacy of Users’ Personal Information on Smartphones by Veelasha Moonsamy Bachelor of IT Honours (BIT Hon) Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy Deakin University December, 2014 Abstract The recent surge in the popularity of smartphones has shifted the focus of malware attackers from the desktop platform onto that of the smartphone platform. Smart- phones, which are hand-held devices with significantly more computational power than traditional mobile phones, store a wide range of personally identifiable infor- mation about their users in order for smartphone applications to function properly. As a result, malware authors are able to acquire private and confidential information about the victims by successfully deploying their attacks. Such information could be later used for blackmailing or trading in underground markets. Thus, the challenge of smartphone malware detection is directly related to the increasing number of smartphone users and applications available. As the number of smartphone malware continues to rapidly increase, there is an urgent need to deploy detection and classification frameworks that can cope with the large volume of suspicious applications and efficiently detect and classify malware. In this thesis, I consider the Android platform as a case study because it is an open-source platform and has the highest number of malicious applications. I begin by proposing a pattern mining algorithm to generate contrasting permission patterns that can distinguish clean from malicious applications. The permission patterns were then used to identify malware. I propose a linear classifier that uses permission patterns as features. These patterns are unique to malicious applications only and can also be used to conduct a high-level malware triage.
    [Show full text]
  • Trendlabs 1Q 2014 Security Roundup: Cybercrime Hits The
    TrendLabsSM 1Q 2014 Security Roundup Cybercrime Hits the Unexpected Bitcoin- and PoS-System-Related Attacks Trouble Users TREND MICRO | TrendLabs 1Q 2014 Security Roundup Contents 1 | Cybercrime and the Cybercriminal Underground 10 | Mobile Threat Landscape 15 | Targeted Attack Campaigns and Cyber Attacks 21 | Digital Life and the Internet of Everything 25 | Appendix TREND MICRO | TrendLabs 1Q 2014 Security Roundup Introduction At the end of 2013, we realized that digital after unusual targets like PoS terminals in heists pushed stick-’em-up bank heists retail chains.4 1 to the curb. While this holds true amid This quarter’s biggest stories featured large data breach incidents and rampant well-orchestrated schemes and large cybercrime, the first quarter of 2014 also sums of money lost to enterprising showed that today’s cybercriminals are cybercriminals. Online banking malware, aiming at previously nontargeted entities for instance, exhibited new behaviors to carry out malicious deeds. Proof though the core tactics cybercriminals of these include the US$480-million used to spread them stayed the same. digital heist Bitcoin exchange, MtGox, Bitcoins and related attacks gained suffered from and recent attacks against prominence as a financial instrument and large retailers via point-of-sale (PoS) a threat. The mobile threat landscape did 2, 3 terminals. These high-profile crimes not undergo drastic changes this quarter targeted unexpected information sources though it has been dubbed “more mature” even if attackers went after the same with the emergence of more Android™ thing—money, used the same techniques bugs. The retailer data breaches we saw despite more strategic planning, and were in recent months highlighted the need for motivated by greed.
    [Show full text]
  • Lutte Contre Les Botnets : Analyse Et Stratégie Eric Freyssinet
    Lutte contre les botnets : analyse et stratégie Eric Freyssinet To cite this version: Eric Freyssinet. Lutte contre les botnets : analyse et stratégie. Cryptographie et sécurité [cs.CR]. Université Pierre et Marie Curie - Paris VI, 2015. Français. NNT : 2015PA066390. tel-01231974v3 HAL Id: tel-01231974 https://tel.archives-ouvertes.fr/tel-01231974v3 Submitted on 15 Feb 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE DE DOCTORAT DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Spécialité Informatique École doctorale Informatique, Télécommunications et Électronique (Paris) Présentée par Éric FREYSSINET Pour obtenir le grade de DOCTEUR DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Sujet de la thèse : Lutte contre les botnets : analyse et stratégie Présentée et soutenue publiquement le 12 novembre 2015 devant le jury composé de : Rapporteurs : M. Jean-Yves Marion Professeur, Université de Lorraine M. Ludovic Mé Enseignant-chercheur, Supélec Rennes Directeurs : M. David Naccache Professeur, École normale supérieure de thèse M. Matthieu Latapy Directeur de recherche, UPMC, LIP6 Examinateurs : Mme Clémence Magnien Directrice de recherche, UPMC, LIP6 Mme Solange Ghernaouti-Hélie Professeure, Université de Lausanne M. Vincent Nicomette Professeur, INSA Toulouse Cette thèse est dédiée à M.
    [Show full text]
  • Cyber Attack Trends: 2020 Mid-Year Report Check Point Cyber Attack Trends: 2020 Mid-Year Report 2
    CYBER ATTACK TRENDS: 2020 MID-YEAR REPORT CHECK POINT CYBER ATTACK TRENDS: 2020 MID-YEAR REPORT 2 Table of Contents Executive Summary ................................................................................................... 3 The World Under COVID-19 ...................................................................................... 4 Double Extortion ........................................................................................................ 6 Cyber Warfare During a Pandemic ........................................................................... 7 Mobile Trends – Seeking New Infection Vectors ...................................................... 8 Cloud Threats ............................................................................................................ 9 Cyber Attack Categories by Region .......................................................................... 10 Global Threat Index Map ........................................................................................... 10 Top Malicious File Types (H1 2020) ........................................................................... 11 Global Malware Statistics.......................................................................................... 12 Top Malware Families ............................................................................................ 12 Top Cryptomining Malware ................................................................................... 14 Top Mobile Malware ..............................................................................................
    [Show full text]
  • A Smart Framework for Mobile Botnet Detection Using Static Analysis
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 14, NO. 6, Jun. 2020 2591 Copyright ⓒ 2020 KSII A Smart Framework for Mobile Botnet Detection Using Static Analysis Shahid Anwar1, Mohamad Fadli Zolkipli2, Vitaliy Mezhuyev3,*, Zakira Inayat4 1 Department of Software Engineering, The University of Lahore | 1-Km, Defence Road Bhobatian Chowk, Lahore, Pakistan. [e-mail: [email protected]] 2 Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, Lebuhraya Tun Razak Gambang, 26300 Kuantan, Malaysia [e-mail: [email protected]] 3 FH JOANNEUM University of Applied Sciences, Institute of Industrial Management Werk-VI-Straße 46, 8605 Kapfenberg, Austria [e-mail: [email protected]] 4 Department of Computer Science, University of Engineering and Technology, Peshawar 2500, Pakistan [e-mail: [email protected]] *Corresponding author: Vitaliy Mezhuyev Received May 12, 2019; revised November 11, 2019; accepted March 18, 2020; published June 30, 2020 Abstract Botnets have become one of the most significant threats to Internet-connected smartphones. A botnet is a combination of infected devices communicating through a command server under the control of botmaster for malicious purposes. Nowadays, the number and variety of botnets attacks have increased drastically, especially on the Android platform. Severe network disruptions through massive coordinated attacks result in large financial and ethical losses. The increase in the number of botnet attacks brings the challenges for detection of harmful software. This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications.
    [Show full text]
  • A Detection Framework for Android Financial Malware
    A Detection Framework for Android Financial Malware by Andi Fitriah Abdul Kadir Master of Computer Science, IIUM, 2013 Bachelor of Computer Science, IIUM, 2009 A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Doctor of Philosophy In the Graduate Academic Unit of Faculty of Computer Science Supervisor(s): Ali A. Ghorbani, Ph.D., Computer Science, Natalia Stakhanova, Ph.D., Computer Science Examining Board: Bradford Nickerson, Ph.D., Faculty of Computer Science, Rongxing Lu, Ph.D., Faculty of Computer Science, Constantine Passaris, Ph.D., Faculty of Arts External Examiner: Nur Zincir-Heywood, Ph.D., Faculty of Computer Science, Dalhousie This dissertation is accepted Dean of Graduate Studies THE UNIVERSITY OF NEW BRUNSWICK December, 2018 ©Andi Fitriah Abdul Kadir, 2019 Abstract As attempts to thwart cybercrime have intensified, so have innovations in how cybercrimi- nals provision their infrastructure to sustain their activities. Consequently, what motivates cybercriminals today has changed: from ego and status, to interest and money; the cyberse- curity researchers today have turned their attention to financial-related malware, especially on the Android platform. There are some major issues faced by researchers in detecting Android financial malware. Firstly, what constitutes Android financial malware is still ambiguous. There is a disparity in labelling the type of malware where most of the cur- rent detection systems emphasize the recognition of generic malware types (e.g., Trojan, Worm) rather than indicating its capabilities (e.g., banking malware, ransomware). With- out knowing what constitutes financial malware, the detection systems are not capable of providing an accurate recognition of an advanced and sophisticated financial-related mal- ware.
    [Show full text]