匿名发送数据盗用充电器使用安卓恶意软件

Arief Ikhwanul, S. M. Nasution, Fairuz Azmi
{"title":"匿名发送数据盗用充电器使用安卓恶意软件","authors":"Arief Ikhwanul, S. M. Nasution, Fairuz Azmi","doi":"10.1109/ICCEREC.2016.7814956","DOIUrl":null,"url":null,"abstract":"Smartphone usage nowadays can't be separated from our daily lives. Almost every daily activity can be supported by smartphone. Aside from its general uses like communication purpose, smartphone also used to store private data. Technological advance also change the way people do their activities, one of them is financial activities. Daily activity be easier with the technology of the internet. Along with the increasing of our needs for smartphone usage, inflict danger about user's data stealing. Some malware have been developed to be a splendid data stealer by utilizing the fault in the system or even in the user itself. The targets of those malware itself are varying. The stolen data can be exploited for their personal use or be sold at the black market and also used for intelligence purposes on a case. What makes world security system concerned is that the malware was designed and developed to be able to communicate with microcontroller device via serial communication. The designer of this malware is able to combine malware and microcontroller to stage his action. Access privilege in the android is very susceptible to exploitation if the super user privilege has been granted (rooted). That kind of malware has become popular issue nowadays and it can be said that those malware is very dangerous because of the impact it caused for the user.","PeriodicalId":431878,"journal":{"name":"2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Anonymous sender data to kleptocharger using Android malware\",\"authors\":\"Arief Ikhwanul, S. M. Nasution, Fairuz Azmi\",\"doi\":\"10.1109/ICCEREC.2016.7814956\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Smartphone usage nowadays can't be separated from our daily lives. Almost every daily activity can be supported by smartphone. Aside from its general uses like communication purpose, smartphone also used to store private data. Technological advance also change the way people do their activities, one of them is financial activities. Daily activity be easier with the technology of the internet. Along with the increasing of our needs for smartphone usage, inflict danger about user's data stealing. Some malware have been developed to be a splendid data stealer by utilizing the fault in the system or even in the user itself. The targets of those malware itself are varying. The stolen data can be exploited for their personal use or be sold at the black market and also used for intelligence purposes on a case. What makes world security system concerned is that the malware was designed and developed to be able to communicate with microcontroller device via serial communication. The designer of this malware is able to combine malware and microcontroller to stage his action. Access privilege in the android is very susceptible to exploitation if the super user privilege has been granted (rooted). That kind of malware has become popular issue nowadays and it can be said that those malware is very dangerous because of the impact it caused for the user.\",\"PeriodicalId\":431878,\"journal\":{\"name\":\"2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCEREC.2016.7814956\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEREC.2016.7814956","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

如今,智能手机的使用已经离不开我们的日常生活。智能手机几乎可以支持每一项日常活动。除了通信等一般用途外,智能手机还用于存储私人数据。技术进步也改变了人们的活动方式,其中之一就是金融活动。随着互联网技术的发展,日常活动变得更加容易。随着我们对智能手机使用需求的增加,用户数据被盗的危险也随之产生。一些恶意软件已经发展成为一个辉煌的数据窃取利用系统中的故障,甚至在用户本身。这些恶意软件的攻击目标各不相同。被盗的数据可以被用于个人使用或在黑市上出售,也可以用于案件的情报目的。引起世界安全系统关注的是,该恶意软件的设计和开发能够通过串行通信与微控制器设备通信。这种恶意软件的设计者能够将恶意软件和微控制器结合起来,以进行他的行动。如果超级用户权限被授予(root), android中的访问权限很容易被利用。这类恶意软件已经成为当今流行的问题,可以说这些恶意软件是非常危险的,因为它对用户造成了影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Anonymous sender data to kleptocharger using Android malware
Smartphone usage nowadays can't be separated from our daily lives. Almost every daily activity can be supported by smartphone. Aside from its general uses like communication purpose, smartphone also used to store private data. Technological advance also change the way people do their activities, one of them is financial activities. Daily activity be easier with the technology of the internet. Along with the increasing of our needs for smartphone usage, inflict danger about user's data stealing. Some malware have been developed to be a splendid data stealer by utilizing the fault in the system or even in the user itself. The targets of those malware itself are varying. The stolen data can be exploited for their personal use or be sold at the black market and also used for intelligence purposes on a case. What makes world security system concerned is that the malware was designed and developed to be able to communicate with microcontroller device via serial communication. The designer of this malware is able to combine malware and microcontroller to stage his action. Access privilege in the android is very susceptible to exploitation if the super user privilege has been granted (rooted). That kind of malware has become popular issue nowadays and it can be said that those malware is very dangerous because of the impact it caused for the user.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Digital forensics study of internet messenger: Line artifact analysis in Android OS Web-based monitoring and control system for aeroponics growing chamber Configuring SmartGLCD as universal data logger for monitoring sound and movement Optimization of 6Slots-7Poles & 12Slots-14Poles flux-switching permanent magnet machines for plug-in HEV Implementation of PID controller and pre-filter to control non-linear ball and plate system
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1