Android跟踪软件检测技术:调查研究

Ruba Taha EyalSalman
{"title":"Android跟踪软件检测技术:调查研究","authors":"Ruba Taha EyalSalman","doi":"10.1109/JEEIT58638.2023.10185812","DOIUrl":null,"url":null,"abstract":"Mobile stalkerware system refers to a type of software that is specifically designed to be installed on a person's mobile device without their knowledge or consent. Once installed, it allows someone else to track the device's location, monitor calls and text messages, and access other personal information. Mobile stalkerware poses several risks to individuals whose devices have been compromised. Most notably, the violation of user privacy. Several techniques proposed to detect stalkerware on a device. This research aims to provide a survey on the different mechanisms proposed to detect stalkerware applications on smartphones. This research includes a summary of the research that has been published about stalkerware applications, their capabilities, and the differences between them in terms of complexity and functionality. As a result, several classifications are used to detect these systems, the most prominent of which are Signature-based, Heuristic-based, Behavioral-based, Machine learning-based, and Sandboxing approaches. It was found that the efficiency of the different detection methods depends on the nature of the stalkerware design, and no particular method can be considered the most efficient. After reviewing the published research, it was found that the efficiency of these applications in terms of functionality is measured by several criteria, the most important of which is their ability to hide and the amount of information they leak about the victim's phone.","PeriodicalId":177556,"journal":{"name":"2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)","volume":"38 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Android Stalkerware Detection Techniques: A Survey Study\",\"authors\":\"Ruba Taha EyalSalman\",\"doi\":\"10.1109/JEEIT58638.2023.10185812\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile stalkerware system refers to a type of software that is specifically designed to be installed on a person's mobile device without their knowledge or consent. Once installed, it allows someone else to track the device's location, monitor calls and text messages, and access other personal information. Mobile stalkerware poses several risks to individuals whose devices have been compromised. Most notably, the violation of user privacy. Several techniques proposed to detect stalkerware on a device. This research aims to provide a survey on the different mechanisms proposed to detect stalkerware applications on smartphones. This research includes a summary of the research that has been published about stalkerware applications, their capabilities, and the differences between them in terms of complexity and functionality. As a result, several classifications are used to detect these systems, the most prominent of which are Signature-based, Heuristic-based, Behavioral-based, Machine learning-based, and Sandboxing approaches. It was found that the efficiency of the different detection methods depends on the nature of the stalkerware design, and no particular method can be considered the most efficient. After reviewing the published research, it was found that the efficiency of these applications in terms of functionality is measured by several criteria, the most important of which is their ability to hide and the amount of information they leak about the victim's phone.\",\"PeriodicalId\":177556,\"journal\":{\"name\":\"2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)\",\"volume\":\"38 2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/JEEIT58638.2023.10185812\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JEEIT58638.2023.10185812","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

移动跟踪软件系统是指在不知情或未经同意的情况下,专门设计安装在个人移动设备上的一种软件。一旦安装,它允许其他人跟踪设备的位置,监控电话和短信,并访问其他个人信息。移动跟踪软件给那些设备被入侵的个人带来了几个风险。最明显的是对用户隐私的侵犯。提出了几种检测设备上跟踪软件的技术。本研究旨在对智能手机上检测跟踪软件应用程序的不同机制进行调查。本研究包括已发表的关于跟踪软件应用程序的研究总结,它们的功能,以及它们之间在复杂性和功能方面的差异。因此,使用几种分类来检测这些系统,其中最突出的是基于签名的、基于启发式的、基于行为的、基于机器学习的和沙盒方法。研究发现,不同检测方法的效率取决于跟踪软件设计的性质,没有哪一种方法可以被认为是最有效的。在回顾了已发表的研究后,我们发现,这些应用程序在功能方面的效率是由几个标准来衡量的,其中最重要的是它们的隐藏能力和它们泄露的受害者手机信息的数量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Android Stalkerware Detection Techniques: A Survey Study
Mobile stalkerware system refers to a type of software that is specifically designed to be installed on a person's mobile device without their knowledge or consent. Once installed, it allows someone else to track the device's location, monitor calls and text messages, and access other personal information. Mobile stalkerware poses several risks to individuals whose devices have been compromised. Most notably, the violation of user privacy. Several techniques proposed to detect stalkerware on a device. This research aims to provide a survey on the different mechanisms proposed to detect stalkerware applications on smartphones. This research includes a summary of the research that has been published about stalkerware applications, their capabilities, and the differences between them in terms of complexity and functionality. As a result, several classifications are used to detect these systems, the most prominent of which are Signature-based, Heuristic-based, Behavioral-based, Machine learning-based, and Sandboxing approaches. It was found that the efficiency of the different detection methods depends on the nature of the stalkerware design, and no particular method can be considered the most efficient. After reviewing the published research, it was found that the efficiency of these applications in terms of functionality is measured by several criteria, the most important of which is their ability to hide and the amount of information they leak about the victim's phone.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信