{"title":"Spyware Injection in Android using Fake Application","authors":"Huda M. Salih, M. S. Mohammed","doi":"10.1109/CSASE48920.2020.9142101","DOIUrl":null,"url":null,"abstract":"Malicious is a malevolent software used to disturb installed applications, collect information. From the outset, malicious software has been developed alongside authentic computer software, creating programs to spy on the user and invade the user’s privacy. The purpose of such applications is often business related, enabling information to be sold for large sums of money. This creates major problems for protection companies and software developers needing to detect spyware, because this is often hidden within the system or within fake applications. In this paper we are going to analyze the behaviour of venous Android spyware. Also, a complete Spyware system has been developed, concealed in a fake application on an Android phone, for the purpose of obtaining information about the victim, such as contacts, messages, calls, accounts, geographical location by Wi-Fi or subscriber identity module (SIM) card, 3G, 4G, Long-Term Evolution (LTE) and other personal information. The spyware can be used to send fake alerts to the victim for purposes of deception.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Computer Science and Software Engineering (CSASE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSASE48920.2020.9142101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Malicious is a malevolent software used to disturb installed applications, collect information. From the outset, malicious software has been developed alongside authentic computer software, creating programs to spy on the user and invade the user’s privacy. The purpose of such applications is often business related, enabling information to be sold for large sums of money. This creates major problems for protection companies and software developers needing to detect spyware, because this is often hidden within the system or within fake applications. In this paper we are going to analyze the behaviour of venous Android spyware. Also, a complete Spyware system has been developed, concealed in a fake application on an Android phone, for the purpose of obtaining information about the victim, such as contacts, messages, calls, accounts, geographical location by Wi-Fi or subscriber identity module (SIM) card, 3G, 4G, Long-Term Evolution (LTE) and other personal information. The spyware can be used to send fake alerts to the victim for purposes of deception.