Utilizing the Cloud to Store Hijacked Camera Images

作者: Christos Kynigos , William Bradley Glisson , Todd Andel , Todd McDonald

DOI: 10.1109/HICSS.2016.679

关键词:

摘要: Mobile devices implementing Android operating systems inherently encourage opportunities to create and implement malicious software. This opportunity increases as dissemination of the OS standalone devices, such cameras, increases. The problem intensifies when these utilize cloud storage service capabilities. Previous security forensics research is focused on malware detection, data leakage system modifications. In this research, was developed implemented a camera running an Operating System. execution successfully transferred images secondary location without notifying user about transfer or raising noticeable indicators with industry accepted mobile device analysis toolkit. contribution initial empirical viability software divert image store it in environment alerting digital nature malware.

参考文章(16)
Xiao Zhang, Wenliang Du, Attacks on Android Clipboard international conference on detection of intrusions and malware, and vulnerability assessment. pp. 72- 91 ,(2014) , 10.1007/978-3-319-08509-8_5
Daoyuan Wu, Rocky K. C. Chang, Analyzing Android Browser Apps for file:// Vulnerabilities international conference on information security. pp. 345- 363 ,(2014) , 10.1007/978-3-319-13257-0_20
Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Leonid Batyuk, Jan Hendrik Clausen, Seyit Ahmet Camtepe, Sahin Albayrak, Can Yildizli, Smartphone malware evolution revisited: Android next target? international conference on malicious and unwanted software. pp. 1- 7 ,(2009) , 10.1109/MALWARE.2009.5403026
Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, Kuo-Ping Wu, DroidMat: Android Malware Detection through Manifest and API Calls Tracing information security. pp. 62- 69 ,(2012) , 10.1109/ASIAJCIS.2012.18
Karl-Johan Karlsson, William Bradley Glisson, Android Anti-forensics: Modifying CyanogenMod hawaii international conference on system sciences. pp. 4828- 4837 ,(2014) , 10.1109/HICSS.2014.593
Jack Euan Ross McMillan, William Bradley Glisson, Michael Bromby, Investigating the Increase in Mobile Phone Evidence in Criminal Activities hawaii international conference on system sciences. pp. 4900- 4909 ,(2013) , 10.1109/HICSS.2013.366
Jianjun Huang, Xiangyu Zhang, Lin Tan, Peng Wang, Bin Liang, AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction international conference on software engineering. pp. 1036- 1046 ,(2014) , 10.1145/2568225.2568301
Michael Grace, Yajin Zhou, Qiang Zhang, Shihong Zou, Xuxian Jiang, RiskRanker Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys '12. pp. 281- 294 ,(2012) , 10.1145/2307636.2307663
S. Biggs, S. Vidalis, Cloud Computing: The impact on digital forensic investigations international conference for internet technology and secured transactions. pp. 1- 6 ,(2009) , 10.1109/ICITST.2009.5402561
Yajin Zhou, Xuxian Jiang, Dissecting Android Malware: Characterization and Evolution ieee symposium on security and privacy. pp. 95- 109 ,(2012) , 10.1109/SP.2012.16