We've updated our privacy policy. Click here to review the details. Tap here to review the details.
Activate your 30 day free trial to unlock unlimited reading.
Activate your 30 day free trial to continue reading.
Download to read offline
In April 2016 Google released 2015 Android security report. The report mentioned an interesting finding, a malware called Ghost Push Downloader attempted billions of installs on the devices and about 4 million devices were infected [1]. This malware was a Downloader, the downloaded payload in turn downloaded and installed other Trojans. Since then Android Ecosystem has seen growing number of multistage stage malware, which either download or drop malicious component only at the later stage of the malware execution. The Decoy app which drops or downloads the malicious component looks innocent to the user, the malicious activity only starts after the innocent looking decoy app is executed.
In addition to exploiting vulnerabilities, these payloads contact compromised call home sources and use social Engineering techniques. In this research, We want to provide an insight into all the recent second stage malware payload that are successful in penetrating Google play and also in infecting users. We also want to investigate how these payloads are successful in evading advance detection techniques and discuss why existing OS defences are not sufficient.
[1]. https://security.googleblog.com/2016/04/android-security-2015-annual-report.html
In April 2016 Google released 2015 Android security report. The report mentioned an interesting finding, a malware called Ghost Push Downloader attempted billions of installs on the devices and about 4 million devices were infected [1]. This malware was a Downloader, the downloaded payload in turn downloaded and installed other Trojans. Since then Android Ecosystem has seen growing number of multistage stage malware, which either download or drop malicious component only at the later stage of the malware execution. The Decoy app which drops or downloads the malicious component looks innocent to the user, the malicious activity only starts after the innocent looking decoy app is executed.
In addition to exploiting vulnerabilities, these payloads contact compromised call home sources and use social Engineering techniques. In this research, We want to provide an insight into all the recent second stage malware payload that are successful in penetrating Google play and also in infecting users. We also want to investigate how these payloads are successful in evading advance detection techniques and discuss why existing OS defences are not sufficient.
[1]. https://security.googleblog.com/2016/04/android-security-2015-annual-report.html
You just clipped your first slide!
Clipping is a handy way to collect important slides you want to go back to later. Now customize the name of a clipboard to store your clips.The SlideShare family just got bigger. Enjoy access to millions of ebooks, audiobooks, magazines, and more from Scribd.
Cancel anytime.Unlimited Reading
Learn faster and smarter from top experts
Unlimited Downloading
Download to take your learnings offline and on the go
You also get free access to Scribd!
Instant access to millions of ebooks, audiobooks, magazines, podcasts and more.
Read and listen offline with any device.
Free access to premium services like Tuneln, Mubi and more.
We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.
You can read the details below. By accepting, you agree to the updated privacy policy.
Thank you!