Publikace UTB
Repozitář publikační činnosti UTB

Investigation into Google Play security mechanisms via experimental botnet

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Investigation into Google Play security mechanisms via experimental botnet en
dc.contributor.author Oulehla, Milan
dc.relation.ispartof 2015 IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2015
dc.identifier.isbn 978-1-5090-0480-5
dc.date.issued 2015
dc.citation.spage 591
dc.citation.epage 596
dc.event.title 15th IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2015
dc.event.location Abu Dhabi
utb.event.state-en United Arab Emirates
utb.event.state-cs Spojené arabské emiráty
dc.event.sdate 2015-12-07
dc.event.edate 2015-12-10
dc.type conferenceObject
dc.language.iso en
dc.publisher Institute of Electrical and Electronics Engineers (IEEE)
dc.identifier.doi 10.1109/ISSPIT.2015.7394406
dc.relation.uri http://ieeexplore.ieee.org/document/7394406/
dc.subject Android en
dc.subject bot en
dc.subject botmaster en
dc.subject CandC server en
dc.subject Google Pay en
dc.subject mobile botnet en
dc.subject mobile devices en
dc.description.abstract Mobile devices such as smartphones and tablets have become a common part of human society of the 21st century and their popularity is continuously growing. However, certain research papers imply that popularity and security do not reach the same level. They suggest that there are security weaknesses allowing publishing applications with malicious behavior on Google Play. For test reasons of Google Play security mechanisms, a special pair of applications has been developed. The former is a testing application containing a mobile botnet client. It has been designed to be resistant against security scans based on dynamic analysis but its malicious intentions have been presented in uncovered form into the code of application. Such testing application has been published on Google Play. The latter is represented by a malware application with the sole purpose of being fraudulently installed on mobile devices without any security verification including Google Play. Certain interesting results have been raised by the research. Based on these results, useful future research directions to security of mobile device field have emerged. © 2015 IEEE. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1006414
utb.identifier.obdid 43873978
utb.identifier.scopus 2-s2.0-84963877299
utb.identifier.wok 000380436100099
utb.source d-scopus
dc.date.accessioned 2016-07-26T14:58:28Z
dc.date.available 2016-07-26T14:58:28Z
utb.contributor.internalauthor Oulehla, Milan
utb.fulltext.affiliation Milan Oulehla Faculty of Applied Informatics Tomas Bata University in Zlín 760 05 Zlín, Czech Republic [email protected]
utb.fulltext.dates -
utb.fulltext.faculty Faculty of Applied Informatics
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam