Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/99419
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVella, Mark Joseph-
dc.contributor.authorRudramurthy, Vishwas-
dc.date.accessioned2022-07-15T10:57:23Z-
dc.date.available2022-07-15T10:57:23Z-
dc.date.issued2018-
dc.identifier.citationVella, M., & Rudramurthy, V. (2018, September). Volatile memory-centric investigation of SMS-hijacked phones: a Pushbullet case study. In 2018 Federated Conference on Computer Science and Information Systems (FedCSIS) (pp. 607-616). IEEE.en_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar/handle/123456789/99419-
dc.description.abstractCloak-and-Dagger attacks targeting Android devices can completely hijack the UI feedback loop, with one possible consequence being that of hijacking SMS functionality for cybercrime purposes. What is of particular concern is that attackers can decouple stealth activities from SMS hijacking. Consequently the latter could be pulled off using completely legitimate apps that normally would allow users to manage text messages from their personal computers (SMSonPC), but this time all hidden away under attacker control. This work proposes a digital investigation process aiming to uncover SMS-hijacked devices. It uses bytecode instrumentation in order to force the dumping of volatile memory areas where evidence for the hijack can be located. Eventually both the malware that conceals the SMS-hijacking and the compromised or smuggled SMSonPC app can be identified. Preliminary results are presented using a case study based on the popular SMSonPC app: Pushbullet.en_GB
dc.language.isoenen_GB
dc.publisherIEEEen_GB
dc.rightsinfo:eu-repo/semantics/restrictedAccessen_GB
dc.subjectOperating systems (Computers)en_GB
dc.subjectAndroid (Electronic resource)en_GB
dc.subjectComputer crimesen_GB
dc.subjectComponent softwareen_GB
dc.subjectSoftware engineeringen_GB
dc.subjectMobile computingen_GB
dc.subjectSmartphonesen_GB
dc.titleVolatile memory-centric investigation of SMS-hijacked phones : a Pushbullet case studyen_GB
dc.typeconferenceObjecten_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder.en_GB
dc.bibliographicCitation.conferencenameFederated Conference on Computer Science and Information Systems (FedCSIS)en_GB
dc.bibliographicCitation.conferenceplacePoznan, Poland, 09-12/09/2018en_GB
dc.description.reviewedpeer-revieweden_GB
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
Volatile_memory-centric_investigation_ofSMS-hijacked_phones_a_Pushbullet_case_study(2018).pdf
  Restricted Access
570.25 kBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.