posted on 2012-01-01, 00:00authored byA Nguyen, Lei Pan
An increasing number of Android devices are being infected and at risk of becoming part of a botnet. Among all types of botnets, control and cornmand based botnets are very popular. In this paper we introduce an effective and efficient method to ddect SMS-based control commands ftvm infected Android devices. Specifically, we rely on the important radio activities recorded in Android log files. These radio activities are currently overlooked by researchers. We show the effectiveness of our rnethod by using the examples frorn published literature. Our method requires much less user knowledge but is more generic than traditional approaches.
History
Location
Melbourne, Vic.
Language
eng
Publication classification
E1 Full written paper - refereed
Copyright notice
2012, Deakin University
Editor/Contributor(s)
M Warren
Pagination
23 - 27
Start date
2012-11-07
ISBN-13
9780987229823
Title of proceedings
ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop
Event
Applications and Technologies in Information Security. Workshop (3rd : 2012 : Melbourne, Vic.)