作者: Siegfried Rasthofer , Irfan Asrar , Stephan Huber , Eric Bodden
DOI: 10.1007/978-3-319-24018-3_12
关键词:
摘要: First we report on a new threat campaign, underway in Korea, which infected around 20,000 Android users within two months. The campaign attacked mobile with malicious applications spread via different channels, such as email attachments or SMS spam. A detailed investigation of the malware resulted identification family Android/BadAccents. represents current state-of-the-art development for banking trojans. Second, describe detail techniques this uses and confront them static dynamic code-analysis applications. We highlight various challenges automatic analysis frameworks that significantly hinder fully detection components malware. Furthermore, exploits previously unknown tapjacking vulnerability operating system, describe. As result work, vulnerability, affecting all versions, will be patched one next releases Open Source Project.