3,748
views
0
recommends
+1 Recommend
1 collections
    8
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Mobile devices forensic platform for malware detection

      Published
      proceedings-article
      , , , , ,
      6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR)
      Cyber Security Research
      10th-12th September 2019
      Malware, mobile terminal, forensic tools, security
      Bookmark

            Abstract

            Nowadays, there is an unprecedented demand for mobile devices. Therefore, their number has increased in time, along with multiple possibly malicious activities which can be performed by or through these devices. The biggest issue is that most of them are not easily detectable or cannot be detected at all. This paper aims to present a platform developed precisely for the detection of malware that has not been prevented infecting the mobile device. By firstly analyzing the multiple tools that exist nowadays against malware, a selection of the best available ones was made in order to be implemented in the proposed system. The designed software platform integrates, in a unitary manner, the malware analysis techniques used nowadays for the existing mobile terminals, but also having the purpose of enhancing their security levels.

            Content

            Author and article information

            Contributors
            Conference
            September 2019
            September 2019
            : 59-66
            Affiliations
            [0001]BEIA Consult International

            Bucharest, Romania
            [0002]University Politehnica of Bucharest

            Bucharest, Romania
            Article
            10.14236/ewic/icscsr19.8
            4f6d7afb-c255-41f5-8a1b-5eaa2b1da16f
            © George Suciu et al. Published by BCS Learning and Development Ltd. 6th International Symposium for ICS & SCADA Cyber Security Research 2019

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            6th International Symposium for ICS & SCADA Cyber Security Research 2019
            ICS-CSR
            6
            Athens, Greece
            10th-12th September 2019
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/icscsr19.8
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            security,forensic tools,mobile terminal,Malware

            REFERENCES

            1. 2018 DroidDetector: a traffic-based platform to detect android malware using machine learning Third International Workshop on Pattern Recognition [Cross Ref]

            2. 2017 HEMD: a highly efficient random forest-based malware detection framework for Android Neural Computing and Applications 30 11 3353 3361 [Cross Ref]

            3. 2018 Attack Detection Application with Attack Tree for Mobile System using Log Analysis Mobile Networks and Applications 24 1 184 192 [Cross Ref]

            4. 2016 Cyber Forensic Tools: A Review International Journal of Engineering Trends and Technology 41 5 266 271

            5. 2015 Forensic Acquisitions of WhatsApp Data on Popular Mobile Platforms 2015 Sixth International Conference on Emerging Security Technologies (EST) [Cross Ref]

            6. Reveal the Truth Retrieved May 4 2019 from https://www.blackbagtech.com/

            7. Empowering Collection to Analysis Excellence Retrieved May 4 2019 from http://accessdata.com/

            8. Most Trusted Endpoint Detection & Response Solution Retrieved May 4 2019 from https://www.guidancesoftware.com/

            9. Magnet AXIOM - Digital Investigation Platform May 4 2019 from https://www.magnetforensics.com/products/magnet-axiom/

            10. Paraben Device Seizure May 4 2019 from https://www.sciencedirect.com/topics/computer-science/paraben-device-seizure

            11. Forensic Solutions May 4 2019 from https://www.mobiledit.com/forensic-solutions

            12. Retrieved May 6 2019 from https://belkasoft.com/ec

            13. The Pioneers of Mobile Forensics May 6 2019 from https://www.msab.com/

            14. Retrieved May 7 2019 from https://www.sleuthkit.org/autopsy/

            15. DEFT - A DFIR Toolkit Retrieved May 10 2019 from http://www.deftlinux.net/

            16. Welcome · Santoku Linux Retrieved May 10 2019 from https://santoku-linux.com/

            17. C.A.IN.E. Retrieved May 10 2019 from http://www.caine-live.net/

            18. PALADIN Retrieved May 11 2019 from https://sumuri.com/software/paladin/

            19. [MobiSec] Mobile Security Testing Live Environment Retrieved May 14 2019 from https://www.kitploit.com/2014/03/mobisec-mobile-security-testing-live.html

            20. What is Bro? [Overview and Resources] 2018 June 6 May 12 2019 from https://bricata.com/blog/what-is-bro-ids/

            21. maltrail - Malicious Traffic Detection System Retrieved May 12 2019 from https://www.darknet.org.uk/2017/06/maltrail-malicious-traffic-detection-system/

            22. Android Penetration Tools Walkthrough Series: MobSF 2019 March 11 May 11 2019 from https://resources.infosecinstitute.com/android-penetration-tools-walkthrough-series-mobsf/#gref

            23. CuckooDroid Book Retrieved May 11 2019 from https://cuckoo-droid.readthedocs.io/en/latest/

            24. Docker Enterprise Container Platform Retrieved May 8 2019 from https://www.docker.com/products/docker-enterprise

            25. About Retrieved May 9 2019 from https://www.postgresql.org/about/

            26. Open-Source Virtualization Platform Retrieved May 11 2019 from https://www.proxmox.com/en/proxmox-ve

            27. What is Kubernetes Retrieved May 11 2019 from https://kubernetes.io/docs/concepts/overview/what-is-kubernetes/

            28. What’s LXC? Retrieved May 10 2019 from https://linuxcontainers.org/lxc/introduction/

            29. Apache Kafka Retrieved May 9 2019 from http://kafka.apache.org/

            30. Elasticsearch Retrieved May 9 2019 from https://www.elastic.co/products/elasticsearch

            31. The Zeek Network Security Monitor Retrieved May 11 2019 from https://www.bro.org/

            32. 2019 May 4 stamparm/maltrail. Retrieved May 11 2019 from https://github.com/stamparm/maltrail

            33. idanr1986 2017 July 25 idanr1986/cuckoo-droid Retrieved May 11 2019 from https://github.com/idanr1986/cuckoo-droid

            34. MobSF 2019 May 4 MobSF/Mobile-Security-Framework-MobSF Retrieved May 11 2019 from https://github.com/MobSF/Mobile-Security-Framework-MobSF

            Comments

            My husband has been frequently deleting all messages for the last couple of days from his phone and he didn’t know i was peeping at him, then i asked him why he was deleting all messages from his phone but he claimed that his phone memory was full and needed more space. Immediately I went in search of a hacker who can get me deleted information and contents from my husband’s phone and luckily for me i came across this reputable ethical hacker, this hacker got the job done for me and provided me with results and i saw that my husband has been lying to me. He was simply deleting all pictures, call logs, chats and text messages between him and his secret lover so i wont get to see what he has been doing at my back. Thank God for reputable hackers who are ready to help. I must say am really impressed with the services i got from The hacker Detective and am here to say a very big thank you: contact him on hack4techspy @gmail com

            2024-05-20 13:49 UTC
            +1

            My husband has been frequently deleting all messages for the last couple of days from his phone and he didn’t know i was peeping at him, then i asked him why he was deleting all messages from his phone but he claimed that his phone memory was full and needed more space. Immediately I went in search of a hacker who can get me deleted information and contents from my husband’s phone and luckily for me i came across this reputable ethical hacker, this hacker got the job done for me and provided me with results and i saw that my husband has been lying to me. He was simply deleting all pictures, call logs, chats and text messages between him and his secret lover so i wont get to see what he has been doing at my back. Thank God for reputable hackers who are ready to help. I must say am really impressed with the services i got from The hacker Detective and am here to say a very big thank you: contact him on hack4techspy @gmail com

            2024-05-20 13:49 UTC
            +1

            We got different intents coming here to search for an app to track our partner or friends so it's advisable to know the truth and not fall prey to the evil ones. I have been in a long distance marriage because of the nature of my job, my husband cheated on me times without number but since I wasn't around to get him caught red handed in the act I decided to hack his cell phone to get all the data activities on his device. I got in contact with techspypro9 @gmail com through the head of the IT department in my workplace. According to him, after a long search on here he got to discover this genius and swift IT personnel, this guy is the best in the game right now. He shared me his contact info, After I got in contact with him, we made a deal and i paid him. I doubted the services at first but what I felt impossible became possible within 6hours,I got access to my husband's phone activities,I don't know how he did it but it looked like magic cause it was as if I had his phone in my palm. I got access to his Snapchat messages and videos, WhatsApp,instagram,Facebook,call logs ,video chat , text messages etc all in one swipe. I'm happy I got to discover the truth, knowing is better than self doubt. He is definitely the real deal, do not hesitate to reach out to him at techspypro9 @gmail com for a perfect, quality and satisfactory spying and investigatory services.

            2024-02-18 23:58 UTC
            +1
            One person recommends this

            We got different intents coming here to search for an app to track our partner or friends so it’s advisable to know the truth and not fall prey to the evil ones. I have been in a long distance marriage because of the nature of my job, my husband cheated on me times without number but since I wasn’t around to get him caught red handed in the act I decided to hack his cell phone to get all the data activities on his device. I got in contact with techspypro @gmail com through the head of the IT department in my workplace. According to him, after a long search on here he got to discover this genius and swift IT personnel, this guy is the best in the game right now. He shared me his contact info, After I got in contact with him, we made a deal and i paid him. I doubted the services at first but what I felt impossible became possible within 6hours,I got access to my husband’s phone activities,I don’t know how he did it but it looked like magic cause it was as if I had his phone in my palm. I got access to his Snapchat messages and videos, WhatsApp,instagram,Facebook,call logs ,video chat , text messages etc all in one swipe. I’m happy I got to discover the truth, knowing is better than self doubt. He is definitely the real deal, do not hesitate to reach out to him at techspypro @gmail com for a perfect, quality and satisfactory spying and investigatory services.

            2024-02-06 17:43 UTC
            +1

            Special thanks to techspypro @gmail com for exposing my cheating husband. Right with me i got a lot of evidences and proofs that shows that my husband is a fuck boy and as well a cheater ranging from his text messages, call logs, whats-app messages, deleted messages and many more, All thanks to Support techspypro @gmail com , if not for him i will never know what has been going on for a long time.Contact him now and thank me later.

            2024-02-06 17:42 UTC
            +1

            Online fraudsters are one of the main reasons why i hate the internet. my mom got hacked recently and they had access to some private information. We had to hire private investigators spyhackelite @gmail com to help us regain control of her accounts. Lucky for us we were able to recover all that we lost through the help of the hackers. write to him now ;spyhackelite @gmail com

            2024-01-31 02:11 UTC
            +1

            Cheating is an act that i believe most men can not do without because of their inconsideration and lack of strength
            and will to keep their pants up. As a woman and someone that happens to always commit myself to my relationships,
            i have been heartbroken quite a few times by cheating partner but on this very last one i get fed up, i devised
            that i had had enough and badly needed to catch my fiancé in the act. I searched Google and this name kept on coming
            up by ex-clients who gave awesome recommendations so i immediately reached out to them and decided to give a try to
            get the heavy burden of suspicion off my mind. I never knew that a phone could be hacked without having physical access
            with it. Thank you Donald! You can write to him at techspypro9 @gmail com.

            2024-02-18 23:58 UTC

            well, it does not look like online scams will stop or reduce anytime soon, the best thing we can do as a people or as victims is to make sure we go after this scammers, leaving them to continue perpetrating their wicked acts gives them more ground and trust me they will not stop until we start going after them and reporting them too.

            I have been a victim of romance scam and binary option scam myself so trust me i really know how it feels, i was able to get my money back and we were able to trace the scammer through the help of Wizesafetyrecovery @ Gmail com, THEY ARE ONE OF THE LEADING FIRMS WHEN IT COMES DOWN TO DIGITAL ASSET REOVERY

            mind you, there are loads of fake firms out there, who pose like they can also help you get your money back, trust me its all lies, the best thing you can do for yourself is to do your own research, go to the SEC website and search, they have the list of legitimate companies on their website.

            2023-09-26 19:33 UTC
            +1

            NEED TO HIRE A HACKER?! Then Hire HACKER4WISE‼️

            HACKER$WISE are a group of Certified and Registered Hackers under the Hackers Forum HackerOne. We usually Advertised in the Dark web, but the rate at wish individuals are been defrauded (Scammed) by false Hackers has actually forced us to start towing adverts on the regular web.

            Based on the HackerOne standard, Hacking for individuals are not allowed and that’s why our services are more reliable and stay undetected. If you are caught, then we are caught, or if you have a problem with our services then we also have a problem of get caught by HackerOne Authorities. We meet up to every job we take as our insurance policy of not getting caught by the HackerOne Authorities.

            COUPLE OF HACKING SERVICES WE OFFER-:
            ▪️Phone Hacking/Cloning ▪️Email Hacking ▪️Social Media account Hacking ▪️Keylogging installations ▪️Deleted Emails, Files & Documents Recovery ▪️Website Hacking ▪️Scam Tracking ▪️Money/Bitcoin Recovery ▪️Binary Option Recovery ▪️Cyber Bully ▪️Virus Installation/ Detection...….etc.

            Feel free to Email is if you need a Hacking services that’s not listed above. We are here to hack for you
            Contact us via the email-: Support @ hacker4wise com \ hacker4wise @ Gmail com


            2022 © All Right Reserved.

            2022-04-22 04:51 UTC
            +1
            2 people recommend this
            wrote:

            The are the best!!!

            2023-09-26 19:32 UTC

            Comment on this article