2018
DOI: 10.1155/2018/8510256
|View full text |Cite
|
Sign up to set email alerts
|

Design and Analysis of Push Notification-Based Malware on Android

Abstract: Establishing secret command and control (C&C) channels from attackers is important in malware design. This paper presents design and analysis of malware architecture exploiting push notification services as C&C channels. The key feature of the push notification-based malware design is remote triggering, which allows attackers to trigger and execute their malware by push notifications. The use of push notification services as covert channels makes it difficult to distinguish this type of malware from other norm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Limited efforts are made to curtail remote triggering. It enhances the stealthiness of malware by allowing malware authors to trigger and execute malware whenever they want [147]. (d) Development of nonintuitive features for robust malware analysis and detection: static and dynamic features need to be explored to the next level to characterize the behavior of an application [146] better.…”
Section: Rq2: Are Ose Framework Robust Enough To Determine the Most Investigated Researchmentioning
confidence: 99%
“…Limited efforts are made to curtail remote triggering. It enhances the stealthiness of malware by allowing malware authors to trigger and execute malware whenever they want [147]. (d) Development of nonintuitive features for robust malware analysis and detection: static and dynamic features need to be explored to the next level to characterize the behavior of an application [146] better.…”
Section: Rq2: Are Ose Framework Robust Enough To Determine the Most Investigated Researchmentioning
confidence: 99%
“…This research also proposed several defense strategies against push notificationbased malware by carefully analyzing its attack process. [12] There is also research on the notification system for students using the Android application. Research is aimed at making communication between teacher and student easier and faster through this notification feature.…”
Section: Previous Research Studiesmentioning
confidence: 99%
“…In contrast, in push notifications, the updates are delivered from a server application to a device without a specific request from the client which has typically subscribed to updates in advance. In the case of smartphones, the client may be built into the operating system [14].…”
Section: Mobile Notificationsmentioning
confidence: 99%