Pub Date : 2022-11-08DOI: 10.1109/ICITSI56531.2022.9970968
Md Rezanur Islam, Insu Oh, Kangbin Yim
In recent years, IoT devices have drawn attention to big data, complicating connectivity, and daily data processing. The automotive sector is no exception. The right way of vehicle data analysis is becoming essential every day for detecting internal errors, protecting against attackers, and connected vehicle concepts such as V2X. Some researchers use raw data to secure CAN, but that's not enough. On the other hand, deep learning is essential to secure autonomous driving and CAN, and data labeling is an obstacle. So, data analysis played an important role in data labeling. There are major flaws in data analysis, feature extraction, and data labeling for in-vehicle networks. Therefore, we proposed a CAN message analysis tool concept that can provide deep label analysis results and new features. There are many data analysis techniques these days, and we are trying to include suitable CAN message analysis techniques in our tool concept.
{"title":"CANTool An In-Vehicle Network Data Analyzer","authors":"Md Rezanur Islam, Insu Oh, Kangbin Yim","doi":"10.1109/ICITSI56531.2022.9970968","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970968","url":null,"abstract":"In recent years, IoT devices have drawn attention to big data, complicating connectivity, and daily data processing. The automotive sector is no exception. The right way of vehicle data analysis is becoming essential every day for detecting internal errors, protecting against attackers, and connected vehicle concepts such as V2X. Some researchers use raw data to secure CAN, but that's not enough. On the other hand, deep learning is essential to secure autonomous driving and CAN, and data labeling is an obstacle. So, data analysis played an important role in data labeling. There are major flaws in data analysis, feature extraction, and data labeling for in-vehicle networks. Therefore, we proposed a CAN message analysis tool concept that can provide deep label analysis results and new features. There are many data analysis techniques these days, and we are trying to include suitable CAN message analysis techniques in our tool concept.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121326031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The increase of smartphone users in Indonesia is the reason for various sectors to improve their services through mobile applications, including the healthcare sector. The healthcare sector is considered a critical sector as it stores various health data of its users classified as confidential. This is the basis for the need to conduct a security analysis for mobile health applications, which are widely used in Indonesia. MobSF (Mobile Security Framework) and MARA (Mobile Application Reverse Engineering and Analysis) Framework are mobile application security analysis methods capable of assessing security levels based on OWASP (Open Web Application Security Project) Mobile Top 10 2016 classification, CVSS (Common Vulnerability Scoring System) and CWE (Common Weakness Enumeration). It is expected that the test results with MobSF and MARA can provide a safety metric for mobile health applications as a means of safety information for users and application developers.
{"title":"Mobile Health Application Security Assesment Based on OWASP Top 10 Mobile Vulnerabilities","authors":"Dimas Febriyan Priambodo, Guntur Satria Ajie, Hendy Aulia Rahman, Aldi Cahya Fajar Nugraha, Aulia Rachmawati, Marcella Risky Avianti","doi":"10.1109/ICITSI56531.2022.9970949","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970949","url":null,"abstract":"The increase of smartphone users in Indonesia is the reason for various sectors to improve their services through mobile applications, including the healthcare sector. The healthcare sector is considered a critical sector as it stores various health data of its users classified as confidential. This is the basis for the need to conduct a security analysis for mobile health applications, which are widely used in Indonesia. MobSF (Mobile Security Framework) and MARA (Mobile Application Reverse Engineering and Analysis) Framework are mobile application security analysis methods capable of assessing security levels based on OWASP (Open Web Application Security Project) Mobile Top 10 2016 classification, CVSS (Common Vulnerability Scoring System) and CWE (Common Weakness Enumeration). It is expected that the test results with MobSF and MARA can provide a safety metric for mobile health applications as a means of safety information for users and application developers.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125533004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-08DOI: 10.1109/ICITSI56531.2022.9971074
Wita Dewisari Tasya, F. Hidayat
The severity of road damage needs to be known in making decisions about when road repairs will be carried out. The system helps enter a severity measure and finally maps out how severe the damage was. The severity of road damage that has been combined with the classification of road damage can be integrated into a decision support system. The value of the pavement condition index (IKP) can be calculated from the identified damage. The aim of this paper is to improve the pavement condition index calculation with interpolation to calculate the reduction factor and corrected total reduction factor. With a more accurate IKP, it is possible to prioritize road damage that needs to be addressed within the existing budget constraints.
{"title":"Road Improvement Decision Support System Based on Road Damage Severe Analysis","authors":"Wita Dewisari Tasya, F. Hidayat","doi":"10.1109/ICITSI56531.2022.9971074","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971074","url":null,"abstract":"The severity of road damage needs to be known in making decisions about when road repairs will be carried out. The system helps enter a severity measure and finally maps out how severe the damage was. The severity of road damage that has been combined with the classification of road damage can be integrated into a decision support system. The value of the pavement condition index (IKP) can be calculated from the identified damage. The aim of this paper is to improve the pavement condition index calculation with interpolation to calculate the reduction factor and corrected total reduction factor. With a more accurate IKP, it is possible to prioritize road damage that needs to be addressed within the existing budget constraints.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123819353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Knowledge is an organizational intangible asset it describes organizational core value. Knowledge defines in individual and organizational artefact. Indonesia began assessing e-government implementation in 2018 and faced various problems and challenges which can be solved by skill and experience in e-government implementation. This research aimed to identify knowledge requirements of e-government implementation in Indonesia and divided it into 4 domains. A mixed methods approach was used to discover some findings related to the required knowledge. Content analysis is used to codify the knowledge require based on the regulation. Then, correspondence analysis is used to analyze the contingency value of each knowledge and domain. The result shows there are 75 knowledge required for e-Government implementation which is divided into 4 domains. BIPLOT diagram represents the association and similarity between each knowledge and the domain.
{"title":"Knowledge Requirement for E-government Implementation in Indonesia: A Mixed Method","authors":"Elin Cahyaningsih, Natascha Lestari Eunike Silalahi, Siti Rohajawati, Muhammad Vallen Firdaus","doi":"10.1109/ICITSI56531.2022.9970893","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970893","url":null,"abstract":"Knowledge is an organizational intangible asset it describes organizational core value. Knowledge defines in individual and organizational artefact. Indonesia began assessing e-government implementation in 2018 and faced various problems and challenges which can be solved by skill and experience in e-government implementation. This research aimed to identify knowledge requirements of e-government implementation in Indonesia and divided it into 4 domains. A mixed methods approach was used to discover some findings related to the required knowledge. Content analysis is used to codify the knowledge require based on the regulation. Then, correspondence analysis is used to analyze the contingency value of each knowledge and domain. The result shows there are 75 knowledge required for e-Government implementation which is divided into 4 domains. BIPLOT diagram represents the association and similarity between each knowledge and the domain.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121141127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-08DOI: 10.1109/ICITSI56531.2022.9970822
Anggastya Diah Andita H. P, I. B. Nugraha
ISO 9001 is a standard for an organization that focuses on quality management. In ISO 9001, the organization must implement seven main clauses in achieving the certification or audit if the company has obtained ISO 9001 certification. One of the clauses is clause 6.2, which is related to quality objectives and focuses on process. The organization can achieve this clause if all SOPs in the organization are appropriately implemented. Therefore, if the SOP is well implemented, the process inside also runs well, and the quality objectives will be in line with the expectations. Manufacturing industry will be the case of the organization for this study. This study proposed a tracing system for the procedure in the SOP that used to achieve clause 6.2, quality objectives in ISO 9001. The database has an important role in system development because the system will store all information in it. Databases with conventional method have various weaknesses in data handling, such as centralized data storage and lack of security. Centralized data will make it difficult for each staff in the organization to access data if the main server is down. This study will focus on blockchain applied to traceability system as database technology because it can minimize the shortcomings of the database with conventional method. The results show that the data traceability system can trace procedures well and the data running well according to its function in storing data with blockchain. Based on these results, the traceability system in this study can trace procedures in achieving quality objectives in ISO 9001.
ISO 9001是一个专注于质量管理的组织的标准。在ISO 9001中,如果公司获得了ISO 9001认证,组织在获得认证或审核时必须实施七个主要条款。其中第6.2条与质量目标有关,侧重于过程。如果组织内的所有标准操作规程得到适当实施,组织就能实现这一条款。因此,如果SOP执行得好,内部的过程也会运行得好,质量目标也会符合预期。本文将以制造业为组织案例进行研究。本研究提出了一个用于实现ISO 9001第6.2条质量目标的SOP程序的跟踪系统。数据库在系统开发中起着重要的作用,因为系统将所有信息存储在数据库中。传统方法的数据库在数据处理方面存在数据集中存储、安全性不足等缺点。如果主服务器宕机,集中的数据将使组织中的每个员工都难以访问数据。本研究将重点研究区块链作为数据库技术应用于可追溯系统,因为它可以最大限度地减少传统方法数据库的缺点。结果表明,根据区块链存储数据的功能,数据可追溯系统可以很好地跟踪流程,数据运行良好。基于这些结果,本研究中的可追溯系统可以追溯实现ISO 9001质量目标的程序。
{"title":"A Blockchain-based Traceability System to Achieve the Quality Objectives in the Production Process of A Manufacturing Industry","authors":"Anggastya Diah Andita H. P, I. B. Nugraha","doi":"10.1109/ICITSI56531.2022.9970822","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970822","url":null,"abstract":"ISO 9001 is a standard for an organization that focuses on quality management. In ISO 9001, the organization must implement seven main clauses in achieving the certification or audit if the company has obtained ISO 9001 certification. One of the clauses is clause 6.2, which is related to quality objectives and focuses on process. The organization can achieve this clause if all SOPs in the organization are appropriately implemented. Therefore, if the SOP is well implemented, the process inside also runs well, and the quality objectives will be in line with the expectations. Manufacturing industry will be the case of the organization for this study. This study proposed a tracing system for the procedure in the SOP that used to achieve clause 6.2, quality objectives in ISO 9001. The database has an important role in system development because the system will store all information in it. Databases with conventional method have various weaknesses in data handling, such as centralized data storage and lack of security. Centralized data will make it difficult for each staff in the organization to access data if the main server is down. This study will focus on blockchain applied to traceability system as database technology because it can minimize the shortcomings of the database with conventional method. The results show that the data traceability system can trace procedures well and the data running well according to its function in storing data with blockchain. Based on these results, the traceability system in this study can trace procedures in achieving quality objectives in ISO 9001.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121761546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-08DOI: 10.1109/ICITSI56531.2022.9971094
Ethar Abdul Wahhab Hachim, Thekra Abbas, M. Gaata
The rapid growth of digital technologies that depending on cloud computing has seriously increased the threats related to information security. This will certainly pose a major threat to the trust of users of the cloud environment. For this reason, the use of algorithms like Rivest Ciphers 4 (RC4) algorithms to encrypt data and then store in the cloud became essential issue. So, because of the simplicity and ease of RC4 algorithm and its suitability to encrypt most data form efficiently, it has been widely used. But, the RC4 algorithm suffers from some weaknesses in both of Key Schedule Algorithm (KSA) and Pseudo-Random Generation Algorithm (PRGA) stages. As, the intruder may be able to follow the traces and thus retrieve the key based on the internal state or the stream of output. There were a lot of modifications in many literature reviews to improve the security and performance of the RC4 algorithm. In this paper, the focus was placed on improving the RC4 algorithm in both of (KSA) and (PRGA) in order to increase the security level. The performance of our improved RC4 algorithm was tested and evaluated by increasing the randomness of the generated key. The experimental results prove that high security level for output based on the security average of ciphertext with various keys and various files size. Thus, get more security level for the personal data that is stored in the cloud.
{"title":"Modified RC4 Algorithm for Improve Data Protection in Cloud Environment","authors":"Ethar Abdul Wahhab Hachim, Thekra Abbas, M. Gaata","doi":"10.1109/ICITSI56531.2022.9971094","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971094","url":null,"abstract":"The rapid growth of digital technologies that depending on cloud computing has seriously increased the threats related to information security. This will certainly pose a major threat to the trust of users of the cloud environment. For this reason, the use of algorithms like Rivest Ciphers 4 (RC4) algorithms to encrypt data and then store in the cloud became essential issue. So, because of the simplicity and ease of RC4 algorithm and its suitability to encrypt most data form efficiently, it has been widely used. But, the RC4 algorithm suffers from some weaknesses in both of Key Schedule Algorithm (KSA) and Pseudo-Random Generation Algorithm (PRGA) stages. As, the intruder may be able to follow the traces and thus retrieve the key based on the internal state or the stream of output. There were a lot of modifications in many literature reviews to improve the security and performance of the RC4 algorithm. In this paper, the focus was placed on improving the RC4 algorithm in both of (KSA) and (PRGA) in order to increase the security level. The performance of our improved RC4 algorithm was tested and evaluated by increasing the randomness of the generated key. The experimental results prove that high security level for output based on the security average of ciphertext with various keys and various files size. Thus, get more security level for the personal data that is stored in the cloud.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134434970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-08DOI: 10.1109/ICITSI56531.2022.9970942
Yudi Setiawan, Dani Gunawan, Rusdi Efendi
Feature extraction on text documents becomes a challenging task for making natural language and machine learning classifications. A document has a complex wording with various meanings and expressions contained in it. The complexity and variety of perceptions make it difficult to find labels and classify documents. The feature extraction process can be carried out to capture important text, phrases and words contained in a document so that the text classification process can be carried out. Term Frequency-Inverse Document Frequency (TF-IDF) is a feature extraction method by performing a grouping process based on the statistics of the occurrence of words from the data collection used. In this paper, the authors present feature extraction with the TF-IDF method with variations of the model approach. Such as; weighting on the occurrence of the word, the filter process on the words in the document, creation rules on term documents, extraction for two or more syllables, and combination with other extraction methods, to improve the text classification process in cyberbullying detection. This paper also opens up opportunities that can be done in the future regarding feature extraction with variations of statistical models of word occurrences in textual detection.
{"title":"Feature Extraction TF-IDF to Perform Cyberbullying Text Classification: A Literature Review and Future Research Direction","authors":"Yudi Setiawan, Dani Gunawan, Rusdi Efendi","doi":"10.1109/ICITSI56531.2022.9970942","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970942","url":null,"abstract":"Feature extraction on text documents becomes a challenging task for making natural language and machine learning classifications. A document has a complex wording with various meanings and expressions contained in it. The complexity and variety of perceptions make it difficult to find labels and classify documents. The feature extraction process can be carried out to capture important text, phrases and words contained in a document so that the text classification process can be carried out. Term Frequency-Inverse Document Frequency (TF-IDF) is a feature extraction method by performing a grouping process based on the statistics of the occurrence of words from the data collection used. In this paper, the authors present feature extraction with the TF-IDF method with variations of the model approach. Such as; weighting on the occurrence of the word, the filter process on the words in the document, creation rules on term documents, extraction for two or more syllables, and combination with other extraction methods, to improve the text classification process in cyberbullying detection. This paper also opens up opportunities that can be done in the future regarding feature extraction with variations of statistical models of word occurrences in textual detection.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126566261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-08DOI: 10.1109/ICITSI56531.2022.9971025
Riyanto, S. Supangkat, Iskandar
Tactical Data Link (TDL) is one of the important elements in Network Centric Warfare (NCW). TDL provides the means for rapid exchange of tactical information between air, ground, sea units and command centers. In military operations, TDL has high demands for resilience, responsiveness, reliability, availability and security. MANET has characteristics that are suitable for the combat environment, namely the ability to self-form and self-healing so that this network may be applied to the TDL system. To produce high performance in MANET adapted for TDL system, an efficient MAC Protocol method is needed. This paper provides a survey of several MAC Protocol methods on a tactical MANET. In this paper also suggests some improvements to the MANET MAC protocol to improve TDL system performance.
{"title":"Survey on MAC Protocol of Mobile Ad hoc Network for Tactical Data Link System","authors":"Riyanto, S. Supangkat, Iskandar","doi":"10.1109/ICITSI56531.2022.9971025","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971025","url":null,"abstract":"Tactical Data Link (TDL) is one of the important elements in Network Centric Warfare (NCW). TDL provides the means for rapid exchange of tactical information between air, ground, sea units and command centers. In military operations, TDL has high demands for resilience, responsiveness, reliability, availability and security. MANET has characteristics that are suitable for the combat environment, namely the ability to self-form and self-healing so that this network may be applied to the TDL system. To produce high performance in MANET adapted for TDL system, an efficient MAC Protocol method is needed. This paper provides a survey of several MAC Protocol methods on a tactical MANET. In this paper also suggests some improvements to the MANET MAC protocol to improve TDL system performance.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133567128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-08DOI: 10.1109/ICITSI56531.2022.9970827
Nurul Hidayah Arrifin, Ulaganathan Subramanian
Blockchain technology is one of the innovations in financial technology that serves as the backbone of Bitcoin and Cryptocurrency. A blockchain is a secure ledger of all data transfer activities that eliminate the need for third-party involvement. It is a technology that records transactions using distributed databases and cryptography. There are three types of blockchain which are public, private, and Consortium or Federated blockchain. Many industries have used blockchain technology. Blockchain in banking is one of the industries that use blockchain the most and need by the country and organization. Many use cases on blockchain in banking, such as Know Your Customer (KYC), clearing and settlement, trade finance, payments, smart contract, and syndicated loans. These use cases could see the impact of implementing blockchain in banking.
{"title":"Blockchain in Banking","authors":"Nurul Hidayah Arrifin, Ulaganathan Subramanian","doi":"10.1109/ICITSI56531.2022.9970827","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970827","url":null,"abstract":"Blockchain technology is one of the innovations in financial technology that serves as the backbone of Bitcoin and Cryptocurrency. A blockchain is a secure ledger of all data transfer activities that eliminate the need for third-party involvement. It is a technology that records transactions using distributed databases and cryptography. There are three types of blockchain which are public, private, and Consortium or Federated blockchain. Many industries have used blockchain technology. Blockchain in banking is one of the industries that use blockchain the most and need by the country and organization. Many use cases on blockchain in banking, such as Know Your Customer (KYC), clearing and settlement, trade finance, payments, smart contract, and syndicated loans. These use cases could see the impact of implementing blockchain in banking.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127787850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-08DOI: 10.1109/ICITSI56531.2022.9970912
Steven Prasetya Ohello, Suhardi
Malware is one of the biggest threats to the Android system today. Anti-malware researchers and malware developers are constantly competing to produce their best product. In this study we tried to evaluate the robustness of anti-malware on the market by auditing it from the point of view of malware authors. By understanding how an attack technique is developed, hopefully we can come up with better defenses in the future. Several studies have shown that transformation with code obfuscation and the use of dynamic code loading has proven to be effective in avoiding detection. But the research so far has only focused on how to bypass anti-malware. Existing studies have not discussed how to bypass Play Protect and permission based checks on the android system and get permission from the user. We propose a framework for auditing anti-malware using various obfuscation techniques and dynamic code loading. Malware will be embedded into legitimate apps to bypass play protect detection. This framework has a mechanism to check and add a number of permissions that malware needs into the application and force the user to grant permissions at runtime. In addition we also added a feature to randomize the order of the obfuscation process and also randomly generate certificates. From the experiments we conducted, each of these features was able to reduce the detection rate of the virustotal by 50%. The overall implementation and testing of our framework shows a significant reduction in detection. The malware was also successfully installed on the real device and carried out its functions properly without being detected.
{"title":"Android Malware Evasion Framework For Auditing Anti-Malware Resistance Against Various Obfuscation Technique And Dynamic Code Loading","authors":"Steven Prasetya Ohello, Suhardi","doi":"10.1109/ICITSI56531.2022.9970912","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970912","url":null,"abstract":"Malware is one of the biggest threats to the Android system today. Anti-malware researchers and malware developers are constantly competing to produce their best product. In this study we tried to evaluate the robustness of anti-malware on the market by auditing it from the point of view of malware authors. By understanding how an attack technique is developed, hopefully we can come up with better defenses in the future. Several studies have shown that transformation with code obfuscation and the use of dynamic code loading has proven to be effective in avoiding detection. But the research so far has only focused on how to bypass anti-malware. Existing studies have not discussed how to bypass Play Protect and permission based checks on the android system and get permission from the user. We propose a framework for auditing anti-malware using various obfuscation techniques and dynamic code loading. Malware will be embedded into legitimate apps to bypass play protect detection. This framework has a mechanism to check and add a number of permissions that malware needs into the application and force the user to grant permissions at runtime. In addition we also added a feature to randomize the order of the obfuscation process and also randomly generate certificates. From the experiments we conducted, each of these features was able to reduce the detection rate of the virustotal by 50%. The overall implementation and testing of our framework shows a significant reduction in detection. The malware was also successfully installed on the real device and carried out its functions properly without being detected.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114306396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}