Mark Balanza, Kervin Alintanahin, Oscar Abendan, J. Dizon, Bernadette Caraig
{"title":"DroidDreamLight潜伏在合法的Android应用程序背后","authors":"Mark Balanza, Kervin Alintanahin, Oscar Abendan, J. Dizon, Bernadette Caraig","doi":"10.1109/MALWARE.2011.6112329","DOIUrl":null,"url":null,"abstract":"Legitimate Android apps that have been modified to carry malicious code have become a common sight in the Android Market and so pose serious security threats to all Android-based device users. We analyzed one particular malware known as DroidDreamLight and compiled our findings in this paper. DroidDreamLight, which affected 30,000–120,000 users in May 2011, is capable of stealing users' personal information and of sending stolen data to cybercriminals.","PeriodicalId":375300,"journal":{"name":"2011 6th International Conference on Malicious and Unwanted Software","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":"{\"title\":\"DroidDreamLight lurks behind legitimate Android apps\",\"authors\":\"Mark Balanza, Kervin Alintanahin, Oscar Abendan, J. Dizon, Bernadette Caraig\",\"doi\":\"10.1109/MALWARE.2011.6112329\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Legitimate Android apps that have been modified to carry malicious code have become a common sight in the Android Market and so pose serious security threats to all Android-based device users. We analyzed one particular malware known as DroidDreamLight and compiled our findings in this paper. DroidDreamLight, which affected 30,000–120,000 users in May 2011, is capable of stealing users' personal information and of sending stolen data to cybercriminals.\",\"PeriodicalId\":375300,\"journal\":{\"name\":\"2011 6th International Conference on Malicious and Unwanted Software\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"21\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 6th International Conference on Malicious and Unwanted Software\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MALWARE.2011.6112329\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 6th International Conference on Malicious and Unwanted Software","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MALWARE.2011.6112329","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Legitimate Android apps that have been modified to carry malicious code have become a common sight in the Android Market and so pose serious security threats to all Android-based device users. We analyzed one particular malware known as DroidDreamLight and compiled our findings in this paper. DroidDreamLight, which affected 30,000–120,000 users in May 2011, is capable of stealing users' personal information and of sending stolen data to cybercriminals.