You are on page 1of 2

Detecting mobile malware threats to were found to contain suspicious behavior in

homeland security through static analysis their APIs, which are commonly found
among malware. Four of the banking apps
Seung-Hyun Seo, Aditi Gupta, Asmaa Mohamed
Sallam, Elisa Bertino, Kangbin Yim violated privacy controls by accessing
private information without user consent.
Journal of Network and Computer Applications 38
(2014) 43-53 Findings suggest that those
Reviewed by Kim Davis applications hosted by third parties
comprised of more risky APIs than those
Purpose: The purpose of this study was to from legitimized outlets such as Google
demonstrate scenarios in which mobile Play. Once malware obtains access to a
devices can be affected by malware. A tool device, the risky behaviors will then take
was purposed by the authors, place due to the application or hacker
DroidAnalyzer, to identify weak areas in executing commands. The authors found
applications hackers can use to attack that suspicious APIs could use codes that
operating systems in smartphones. These will aid in tracking planes, finding
applications are commonly used and scheduled flights, downloading data from
available for consumers use. The goal of airlines, and monitoring home security
DroidAnalyzer is for the authors to detect systems. For example, banking apps,
exploits within the applications that may commonly sent text messages to a user, even
become harmful to users. though normal banking apps generally do
Methods: The study investigated 1260 not allow this type of behavior. Authors not
mobile malware samples that were found in that hackers could easily create fake updates
the Android Malware Genome Project for the program to counteract the ability to
dataset. From these samples, (N= 137) 76 flag suspicious apps. Hackers might also
different applications were collected which gain access and convert the code so that
consisted of 32 banking apps, 29 flight specific languages in the APIs will not be
booking apps, and 15 home security apps picked up.
from both Google Play and third party Comment: The authors conducting this
outlets. The authors fed DroidAnalyzer a study followed through with not only
preset list of risky commands and APIs, analyzing flaws in applications used by
application programming interfaces, to run individuals, but also illustrating how the
against these applications. DroidAnalyzer flaws can effect aspects relating to homeland
was then used to test the levels of security. Hackers not only have multiple
suspiciousness encoded in each applications ways to control a device through application
language. downloads but also use these tactics to
Results: Results identified a number of potentially obtain private data to use for
risky applications that are available for destructive purposes. The fact that many
download through smartphones. 92.7% of hackers are using these outlets to obtain
the samples returned values that show flaws personal information, hack into banks and
in the applications coding. DroidAnalyzer other infrastructures, and hack into phones
then terminates the application to avoid are alarming in the least. This could set
harmful executions. Additionally, 76 apps examples for consumers to be extremely
alert of what applications they download and
from where. There remain aspects of the
DroidAnalyzer that can still be overridden.
Hackers could alter their codes to avoid
being picked up by the apps testing
techniques prove there is progress to be
made. In order to be sheltered from complex
attacks, advanced alterations in the
DroidAnalyzer must be created to protect
against a number of things, not just warn of
suspicious applications. Another weakness
of the program is that hackers could
potentially create false updates for the
program, users will download it, and hackers
will be able to change the programs purpose
from benevolent to malignant. Hackers will
find ways to get around their codes being
picked up, something that application
creators will have to evolve to prevent
overriding of their applications code. The
authors have pointed out some major issues
facing todays technology not only by giving
examples of situations affecting homeland
security, but also creating ways that users
can be deterted from using risky, third party
applications.

You might also like