SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 616
ANDROID MALWARE
Mohammed Tarwala1
, Munwar Hussain Shelia2
, Nazmuddin Mavliwala3
, Shabana Tadvi4
1
Student, Computer Engineering, MHSSCOE, Maharashtra, India
2
Student, Computer Engineering, MHSSCOE, Maharashtra, India
3
Student, Computer Engineering, MHSSCOE, Maharashtra, India
4
Assistance Professor, Computer Engineering, MHSSCOE, Maharashtra, India
Abstract
Now a day’s android devices are so common that they are used by everyone in the world. But with the commonness of the android OS
and Android based devices there comes a threat to these android devices. This paper will implement some of the threats to the
Android device and will also present their counter measures. First of all it will implement trivial malware attack on android device
and android OS like message stealing and contact stealing, files stealing from SD card and also their solutions to prevent it. Secondly
this project will perform more sophisticated attacks like whatsapp message stealing, using twitter as command and control in android
devices and using Web Based Remote Exploration and Control System, denial of convenience attacks using fake access point, phishing
attacks.
Keywords: Android Malware, Mobile Malware, Flaws in android Security Model, Web based exploitation, Application
phishing in android.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Android is everywhere Phones Tablets. TVs and set-top boxes
powered by Google TV. Soon, Android will be in cars and all
sort of other places as well. However, the general theme of
Android devices will be smaller screens and/or no hardware
keyboard. And, by the numbers, Android will probably be
associated mostly with smart phones for the foreseeable
future. For developers, this has both benefits and drawbacks,
as described next. This chapter also describes the main
components in an Android application and the Android
features that you can exploit when developing your
applications.
Android powers hundreds of millions of mobile devices in
more than 190 countries around the world. It's the largest
installed base of any mobile platform and is growing fast.
Every day another million user’s power up their Android
devices for the first time and start looking for apps, games,
and other digital content Android gives you everything you
need to build best-in-class app experiences. It gives you a
single application model that lets you deploy your apps
broadly to hundreds of millions of users across a wide range of
devices from phones to tablets and beyond.
People with mobile phones tend to get very irritated when
those phones do not work. Similarly, those same people will
get irritated if your program “breaks” their phones by
1. Tying up the CPU such that calls can’t be received.
2. Not quietly fading into the background when a call comes
in or needs to be placed, because the program doesn’t work
properly with the rest of the phone’s operating system.
3. Crashing the phone’s operating system, such as by leaking
memory like a sieve.
As with increase in popularity of this platform it has become
attractive target for the hackers. Attackers have shifted their
interest to this platform because it not only gives access to
victim’s files and personal details but also gives information
regarding victim’s location. Attackers can intercept victim’s
phone calls and messages.
The purpose of undertaking this project is to understand the
android framework and the framework’s weakness and what
type of attack could be done on this platform and also to
secure it by proposing feasible and proper patches for the
corresponding attacks thus making the system more secure
and safe to use. Also this project could help the security
organizations to identify the irrational activities and could take
appropriate efforts to avoid them.
2. PROPOSED SYSTEM
As most of the spyware uses different types of command and
control servers which can be easily traceable will be using the
twitter as our command and control and also use public
service like pastebin.com to upload file and response to
command.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 617
The features of android malware application can be briefly
summarized as follows:
2.1 Command and Control Centre (C&C)
Once the mobile device is infected with the malware the next
thing we are looking for is to control the device which is done
from a control centre which uses a channel to communicate to
the infected system. In this design twitter is used as channel
for communication. Attacker will use a web based command
panel which will tweet command using attackers twitter
account, this will be the command to be executed on
compromised phone on the other end i.e. infected phone will
read the tweet from the attacker and follow the order. Tweet
may include the configuration command which changes the
configuration of the malware like replaying channel. The
infected phone will communicate back using other twitter
account, so both attacker and compromised phone are using
different twitter account. All infected devices will be using
same twitter account.
We will be using the Hash tag to send the commands from the
web interface. The hash tag will be dynamically generated by
our own algorithm for every single day.The algorithm consists
of a string array which has the code for the numbers from one
to ten.
hashGeneratingStr[]={"ps","dk","rn","dh","kw","su","ql","ox"
,"zr"};
Fig 1: Block diagram of android malware
So the hash tag will be generated as follows:
If today date is (01 – 03 – 2014)
0 ps
1 dk
0 ps
3 dh
2 rn
0 ps
1 dk
4 kw
Then the hash will be #psdkpsdhrnpsdkkw.
The command generated by web interface will include the
hash tag along with the attack command to perform a specific
attack on the victim phone.
Sample Command generated by the web interface
#psdkpsdhrnpsdkkw sms-relay <attackers phone no>
<victimsphone no>.
The following command consist of the hash tag as well as the
attack name that is the sms relaying attack along with other
attributes of the sms relaying attack. The following command
will be twitted on the twitter account using the hash tag
generated by the algorithm. Also the result file or snapshot
will be twitted by the malware using the same algorithm. If the
file is big in size it will be uploaded on pastebin.com.
2.2 Application Phishing
After receiving the attack command from the twitter command
and control the malware will scan the foreground activity to
see which application is running. After scanning the malware
will use the phished application to activity to get the victims
credentials and will upload it to the pastebin.com.
2.3 SMS Relaying
Attacker will send SMS to infected phone which will be
relayed to other phone number, when the phone number will
reply to compromised phone it will reply to the attacker this
way attacker will remain stealth.
2.4 Stealing WhatsApp Chat:
After receiving the command from the attacker the malware in
the device firstly gets the external storage rights to access the
external storage. After getting the rights the malware access
the Whatsapp message database stored in the external storage
of the device. After accessing the database the malware then
attaches the database file to the mail via a attach mail
command and then sends it to the attacker via mail or it can
simply upload it to the pastebin.com. The command and center
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 618
will give the URL of the database to the attacker. The attacker
can then decrypt the database file and see the content in it.
3. CONCLUSIONS
The Android OS can be improved further for: To use the same
feature in an authenticated manner so this can be used for
surveillance against perpetrator, thus preventing it to fall under
wrong hands or person with malicious intent.
This system can also be used to monitor the phone to prevent
it to install cracked or pirated software thus preventing the
piracy. User must be informed properly why particular
permission is used (Android have a security permission
model), proper justification has to be provided that why
software needs to use certain feature of mobile device like for
example why does it require phones GPS location.
REFERENCES
[1]. Mark Murphy and Apress, “Beginning android 3”.
[2]. Wei Meng Lee and Wrox, “Beginning Android tablet
Application Development”.
[3]. James Steele and Nelson,”The android developer’s
cookbook”
[4]. Md. Ashraful Alam Milton and Ainul Anam Shahjamal
Khan, “Web Based Remote Exploration and Control System
Using Android Mobile Phone”, IEEE/OSAIIAPR
International Conference on Informatics, Electronics &
Vision.
[5]. Earlence Fernandes and Bruno Crispo, “FM 99.9, Radio
Virus: Exploiting FM Radio Broadcasts for Malware
Deployment”, IEEE TRANSACTIONS ON INFORMATION
FORENSICS AND SECURITY, VOL. 8, NO. 6, JUNE 2013.
[6]. Dino A. Dai Zovi and Alexander Sotirov,” Mobile Attacks
and Defense”
[7]. Marius Cristea and Bogdan Groza, “Fingerprinting
Smartphones Remotely via ICMP Timestamps”, IEEE
COMMUNICATIONS LETTERS, VOL. 17, NO. 6, JUNE
2013.
[8]. http://c0defreak.blogspot.in/2014/02/android-malware-
detecting-emulator.html.
BIOGRAPHIES
Name: Mr. Mohammed Tarwala
Designation: Student
Department: Computer Engineering
Qualifications: B.E (comp)Pursuing
Name: Mr.Munwar Hussain Shelia
Designation: Student
Department: Computer Engineering
Qualifications: B.E (Comp)Pursuing
Name: Mr.Nazmuddin Mavliwala
Designation: Student
Department: Computer Engineering
Qualifications: B.E (Comp)Pursuing
Name: Mrs. Shabana Tadvi
Designation: Assistant Professor
Department: Computer Engineering
Qualifications: B. E. (Comp.) M. E. (Comp.),
PhD. (Pursuing)

More Related Content

What's hot

What's hot (19)

pegasus spyware
pegasus spywarepegasus spyware
pegasus spyware
 
Communication security 2021
Communication security 2021Communication security 2021
Communication security 2021
 
Hacking
HackingHacking
Hacking
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
 
Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
 
Ransomware attacks reveton
Ransomware attacks revetonRansomware attacks reveton
Ransomware attacks reveton
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
Hacker !
Hacker !Hacker !
Hacker !
 
Hackers 22
Hackers 22Hackers 22
Hackers 22
 
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
 
Pegasus
PegasusPegasus
Pegasus
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysis
 
Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
 
Hacking
Hacking Hacking
Hacking
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
UNDERSTANDING HACKING
UNDERSTANDING HACKINGUNDERSTANDING HACKING
UNDERSTANDING HACKING
 

Viewers also liked

Co channel deployment cross layer approach for lte heterogeneous networks
Co channel deployment cross layer approach for lte heterogeneous networksCo channel deployment cross layer approach for lte heterogeneous networks
Co channel deployment cross layer approach for lte heterogeneous networkseSAT Journals
 
Aero design analysis for modified darrieus based-straight bladed vawt systems
Aero design analysis for modified darrieus based-straight bladed vawt systemsAero design analysis for modified darrieus based-straight bladed vawt systems
Aero design analysis for modified darrieus based-straight bladed vawt systemseSAT Journals
 
An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...eSAT Journals
 
Scalable recommendation with social contextual information
Scalable recommendation with social contextual informationScalable recommendation with social contextual information
Scalable recommendation with social contextual informationeSAT Journals
 
Clustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringClustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringeSAT Journals
 
Assessment of industrial byproducts as permeable reactive barriers for landfi...
Assessment of industrial byproducts as permeable reactive barriers for landfi...Assessment of industrial byproducts as permeable reactive barriers for landfi...
Assessment of industrial byproducts as permeable reactive barriers for landfi...eSAT Journals
 
An mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manetsAn mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manetseSAT Journals
 
Advanced control systems in two wheeler and finding the collision site of the...
Advanced control systems in two wheeler and finding the collision site of the...Advanced control systems in two wheeler and finding the collision site of the...
Advanced control systems in two wheeler and finding the collision site of the...eSAT Journals
 
Wear and corrosion studies on ferritic stainless steel (ss 409 m)
Wear and corrosion studies on ferritic stainless steel (ss 409 m)Wear and corrosion studies on ferritic stainless steel (ss 409 m)
Wear and corrosion studies on ferritic stainless steel (ss 409 m)eSAT Journals
 
Solvent free synthesis of malonyl chlorides a green chemistry approach
Solvent free synthesis of malonyl chlorides   a green chemistry approachSolvent free synthesis of malonyl chlorides   a green chemistry approach
Solvent free synthesis of malonyl chlorides a green chemistry approacheSAT Journals
 
Scalable recommendation with social contextual information
Scalable recommendation with social contextual informationScalable recommendation with social contextual information
Scalable recommendation with social contextual informationeSAT Journals
 
A change of profile based on location
A change of profile based on locationA change of profile based on location
A change of profile based on locationeSAT Journals
 
Chebyshev filter applied to an inversion technique for breast tumour detection
Chebyshev filter applied to an inversion technique for breast tumour detectionChebyshev filter applied to an inversion technique for breast tumour detection
Chebyshev filter applied to an inversion technique for breast tumour detectioneSAT Journals
 
Breakdown of tractor parts in ghana the case of ghana heavy equipment limited...
Breakdown of tractor parts in ghana the case of ghana heavy equipment limited...Breakdown of tractor parts in ghana the case of ghana heavy equipment limited...
Breakdown of tractor parts in ghana the case of ghana heavy equipment limited...eSAT Journals
 
Quality – cost trade off (qct) for contractor selection
Quality – cost trade off (qct) for contractor selectionQuality – cost trade off (qct) for contractor selection
Quality – cost trade off (qct) for contractor selectioneSAT Journals
 
A parametric study of x and v bracing industrial steel structure
A parametric study of x and v bracing industrial steel structureA parametric study of x and v bracing industrial steel structure
A parametric study of x and v bracing industrial steel structureeSAT Journals
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueeSAT Journals
 
Vehicle pollution control and traffic management
Vehicle pollution control and traffic managementVehicle pollution control and traffic management
Vehicle pollution control and traffic managementeSAT Journals
 
To study the behaviour of nanorefrigerant in vapour compression cycle a review
To study the behaviour of nanorefrigerant in vapour compression cycle  a reviewTo study the behaviour of nanorefrigerant in vapour compression cycle  a review
To study the behaviour of nanorefrigerant in vapour compression cycle a revieweSAT Journals
 

Viewers also liked (19)

Co channel deployment cross layer approach for lte heterogeneous networks
Co channel deployment cross layer approach for lte heterogeneous networksCo channel deployment cross layer approach for lte heterogeneous networks
Co channel deployment cross layer approach for lte heterogeneous networks
 
Aero design analysis for modified darrieus based-straight bladed vawt systems
Aero design analysis for modified darrieus based-straight bladed vawt systemsAero design analysis for modified darrieus based-straight bladed vawt systems
Aero design analysis for modified darrieus based-straight bladed vawt systems
 
An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...
 
Scalable recommendation with social contextual information
Scalable recommendation with social contextual informationScalable recommendation with social contextual information
Scalable recommendation with social contextual information
 
Clustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringClustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clustering
 
Assessment of industrial byproducts as permeable reactive barriers for landfi...
Assessment of industrial byproducts as permeable reactive barriers for landfi...Assessment of industrial byproducts as permeable reactive barriers for landfi...
Assessment of industrial byproducts as permeable reactive barriers for landfi...
 
An mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manetsAn mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manets
 
Advanced control systems in two wheeler and finding the collision site of the...
Advanced control systems in two wheeler and finding the collision site of the...Advanced control systems in two wheeler and finding the collision site of the...
Advanced control systems in two wheeler and finding the collision site of the...
 
Wear and corrosion studies on ferritic stainless steel (ss 409 m)
Wear and corrosion studies on ferritic stainless steel (ss 409 m)Wear and corrosion studies on ferritic stainless steel (ss 409 m)
Wear and corrosion studies on ferritic stainless steel (ss 409 m)
 
Solvent free synthesis of malonyl chlorides a green chemistry approach
Solvent free synthesis of malonyl chlorides   a green chemistry approachSolvent free synthesis of malonyl chlorides   a green chemistry approach
Solvent free synthesis of malonyl chlorides a green chemistry approach
 
Scalable recommendation with social contextual information
Scalable recommendation with social contextual informationScalable recommendation with social contextual information
Scalable recommendation with social contextual information
 
A change of profile based on location
A change of profile based on locationA change of profile based on location
A change of profile based on location
 
Chebyshev filter applied to an inversion technique for breast tumour detection
Chebyshev filter applied to an inversion technique for breast tumour detectionChebyshev filter applied to an inversion technique for breast tumour detection
Chebyshev filter applied to an inversion technique for breast tumour detection
 
Breakdown of tractor parts in ghana the case of ghana heavy equipment limited...
Breakdown of tractor parts in ghana the case of ghana heavy equipment limited...Breakdown of tractor parts in ghana the case of ghana heavy equipment limited...
Breakdown of tractor parts in ghana the case of ghana heavy equipment limited...
 
Quality – cost trade off (qct) for contractor selection
Quality – cost trade off (qct) for contractor selectionQuality – cost trade off (qct) for contractor selection
Quality – cost trade off (qct) for contractor selection
 
A parametric study of x and v bracing industrial steel structure
A parametric study of x and v bracing industrial steel structureA parametric study of x and v bracing industrial steel structure
A parametric study of x and v bracing industrial steel structure
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation technique
 
Vehicle pollution control and traffic management
Vehicle pollution control and traffic managementVehicle pollution control and traffic management
Vehicle pollution control and traffic management
 
To study the behaviour of nanorefrigerant in vapour compression cycle a review
To study the behaviour of nanorefrigerant in vapour compression cycle  a reviewTo study the behaviour of nanorefrigerant in vapour compression cycle  a review
To study the behaviour of nanorefrigerant in vapour compression cycle a review
 

Similar to Android malware

Report of android hacking
Report of android hackingReport of android hacking
Report of android hackingdiv2345
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityMohammad Khreesha
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSEditor IJCATR
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisIRJET Journal
 
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...IJERA Editor
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET Journal
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...IJERA Editor
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...IOSR Journals
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSBRNSSPublicationHubI
 
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3IJERA Editor
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
Attribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android SmartphonesAttribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android SmartphonesIJCSIS Research Publications
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
 

Similar to Android malware (20)

Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
 
Irjet v7 i3811
Irjet v7 i3811Irjet v7 i3811
Irjet v7 i3811
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault Analysis
 
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
 
Android security
Android securityAndroid security
Android security
 
Android security
Android securityAndroid security
Android security
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...
 
HinDroid
HinDroidHinDroid
HinDroid
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
 
OS-Project-Report-Team-8
OS-Project-Report-Team-8OS-Project-Report-Team-8
OS-Project-Report-Team-8
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OS
 
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A017360104
A017360104A017360104
A017360104
 
Attribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android SmartphonesAttribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android Smartphones
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Android malware

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 616 ANDROID MALWARE Mohammed Tarwala1 , Munwar Hussain Shelia2 , Nazmuddin Mavliwala3 , Shabana Tadvi4 1 Student, Computer Engineering, MHSSCOE, Maharashtra, India 2 Student, Computer Engineering, MHSSCOE, Maharashtra, India 3 Student, Computer Engineering, MHSSCOE, Maharashtra, India 4 Assistance Professor, Computer Engineering, MHSSCOE, Maharashtra, India Abstract Now a day’s android devices are so common that they are used by everyone in the world. But with the commonness of the android OS and Android based devices there comes a threat to these android devices. This paper will implement some of the threats to the Android device and will also present their counter measures. First of all it will implement trivial malware attack on android device and android OS like message stealing and contact stealing, files stealing from SD card and also their solutions to prevent it. Secondly this project will perform more sophisticated attacks like whatsapp message stealing, using twitter as command and control in android devices and using Web Based Remote Exploration and Control System, denial of convenience attacks using fake access point, phishing attacks. Keywords: Android Malware, Mobile Malware, Flaws in android Security Model, Web based exploitation, Application phishing in android. ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Android is everywhere Phones Tablets. TVs and set-top boxes powered by Google TV. Soon, Android will be in cars and all sort of other places as well. However, the general theme of Android devices will be smaller screens and/or no hardware keyboard. And, by the numbers, Android will probably be associated mostly with smart phones for the foreseeable future. For developers, this has both benefits and drawbacks, as described next. This chapter also describes the main components in an Android application and the Android features that you can exploit when developing your applications. Android powers hundreds of millions of mobile devices in more than 190 countries around the world. It's the largest installed base of any mobile platform and is growing fast. Every day another million user’s power up their Android devices for the first time and start looking for apps, games, and other digital content Android gives you everything you need to build best-in-class app experiences. It gives you a single application model that lets you deploy your apps broadly to hundreds of millions of users across a wide range of devices from phones to tablets and beyond. People with mobile phones tend to get very irritated when those phones do not work. Similarly, those same people will get irritated if your program “breaks” their phones by 1. Tying up the CPU such that calls can’t be received. 2. Not quietly fading into the background when a call comes in or needs to be placed, because the program doesn’t work properly with the rest of the phone’s operating system. 3. Crashing the phone’s operating system, such as by leaking memory like a sieve. As with increase in popularity of this platform it has become attractive target for the hackers. Attackers have shifted their interest to this platform because it not only gives access to victim’s files and personal details but also gives information regarding victim’s location. Attackers can intercept victim’s phone calls and messages. The purpose of undertaking this project is to understand the android framework and the framework’s weakness and what type of attack could be done on this platform and also to secure it by proposing feasible and proper patches for the corresponding attacks thus making the system more secure and safe to use. Also this project could help the security organizations to identify the irrational activities and could take appropriate efforts to avoid them. 2. PROPOSED SYSTEM As most of the spyware uses different types of command and control servers which can be easily traceable will be using the twitter as our command and control and also use public service like pastebin.com to upload file and response to command.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 617 The features of android malware application can be briefly summarized as follows: 2.1 Command and Control Centre (C&C) Once the mobile device is infected with the malware the next thing we are looking for is to control the device which is done from a control centre which uses a channel to communicate to the infected system. In this design twitter is used as channel for communication. Attacker will use a web based command panel which will tweet command using attackers twitter account, this will be the command to be executed on compromised phone on the other end i.e. infected phone will read the tweet from the attacker and follow the order. Tweet may include the configuration command which changes the configuration of the malware like replaying channel. The infected phone will communicate back using other twitter account, so both attacker and compromised phone are using different twitter account. All infected devices will be using same twitter account. We will be using the Hash tag to send the commands from the web interface. The hash tag will be dynamically generated by our own algorithm for every single day.The algorithm consists of a string array which has the code for the numbers from one to ten. hashGeneratingStr[]={"ps","dk","rn","dh","kw","su","ql","ox" ,"zr"}; Fig 1: Block diagram of android malware So the hash tag will be generated as follows: If today date is (01 – 03 – 2014) 0 ps 1 dk 0 ps 3 dh 2 rn 0 ps 1 dk 4 kw Then the hash will be #psdkpsdhrnpsdkkw. The command generated by web interface will include the hash tag along with the attack command to perform a specific attack on the victim phone. Sample Command generated by the web interface #psdkpsdhrnpsdkkw sms-relay <attackers phone no> <victimsphone no>. The following command consist of the hash tag as well as the attack name that is the sms relaying attack along with other attributes of the sms relaying attack. The following command will be twitted on the twitter account using the hash tag generated by the algorithm. Also the result file or snapshot will be twitted by the malware using the same algorithm. If the file is big in size it will be uploaded on pastebin.com. 2.2 Application Phishing After receiving the attack command from the twitter command and control the malware will scan the foreground activity to see which application is running. After scanning the malware will use the phished application to activity to get the victims credentials and will upload it to the pastebin.com. 2.3 SMS Relaying Attacker will send SMS to infected phone which will be relayed to other phone number, when the phone number will reply to compromised phone it will reply to the attacker this way attacker will remain stealth. 2.4 Stealing WhatsApp Chat: After receiving the command from the attacker the malware in the device firstly gets the external storage rights to access the external storage. After getting the rights the malware access the Whatsapp message database stored in the external storage of the device. After accessing the database the malware then attaches the database file to the mail via a attach mail command and then sends it to the attacker via mail or it can simply upload it to the pastebin.com. The command and center
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 618 will give the URL of the database to the attacker. The attacker can then decrypt the database file and see the content in it. 3. CONCLUSIONS The Android OS can be improved further for: To use the same feature in an authenticated manner so this can be used for surveillance against perpetrator, thus preventing it to fall under wrong hands or person with malicious intent. This system can also be used to monitor the phone to prevent it to install cracked or pirated software thus preventing the piracy. User must be informed properly why particular permission is used (Android have a security permission model), proper justification has to be provided that why software needs to use certain feature of mobile device like for example why does it require phones GPS location. REFERENCES [1]. Mark Murphy and Apress, “Beginning android 3”. [2]. Wei Meng Lee and Wrox, “Beginning Android tablet Application Development”. [3]. James Steele and Nelson,”The android developer’s cookbook” [4]. Md. Ashraful Alam Milton and Ainul Anam Shahjamal Khan, “Web Based Remote Exploration and Control System Using Android Mobile Phone”, IEEE/OSAIIAPR International Conference on Informatics, Electronics & Vision. [5]. Earlence Fernandes and Bruno Crispo, “FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 6, JUNE 2013. [6]. Dino A. Dai Zovi and Alexander Sotirov,” Mobile Attacks and Defense” [7]. Marius Cristea and Bogdan Groza, “Fingerprinting Smartphones Remotely via ICMP Timestamps”, IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 6, JUNE 2013. [8]. http://c0defreak.blogspot.in/2014/02/android-malware- detecting-emulator.html. BIOGRAPHIES Name: Mr. Mohammed Tarwala Designation: Student Department: Computer Engineering Qualifications: B.E (comp)Pursuing Name: Mr.Munwar Hussain Shelia Designation: Student Department: Computer Engineering Qualifications: B.E (Comp)Pursuing Name: Mr.Nazmuddin Mavliwala Designation: Student Department: Computer Engineering Qualifications: B.E (Comp)Pursuing Name: Mrs. Shabana Tadvi Designation: Assistant Professor Department: Computer Engineering Qualifications: B. E. (Comp.) M. E. (Comp.), PhD. (Pursuing)