{"title":"匿名发送数据盗用充电器使用安卓恶意软件","authors":"Arief Ikhwanul, S. M. Nasution, Fairuz Azmi","doi":"10.1109/ICCEREC.2016.7814956","DOIUrl":null,"url":null,"abstract":"Smartphone usage nowadays can't be separated from our daily lives. Almost every daily activity can be supported by smartphone. Aside from its general uses like communication purpose, smartphone also used to store private data. Technological advance also change the way people do their activities, one of them is financial activities. Daily activity be easier with the technology of the internet. Along with the increasing of our needs for smartphone usage, inflict danger about user's data stealing. Some malware have been developed to be a splendid data stealer by utilizing the fault in the system or even in the user itself. The targets of those malware itself are varying. The stolen data can be exploited for their personal use or be sold at the black market and also used for intelligence purposes on a case. What makes world security system concerned is that the malware was designed and developed to be able to communicate with microcontroller device via serial communication. The designer of this malware is able to combine malware and microcontroller to stage his action. Access privilege in the android is very susceptible to exploitation if the super user privilege has been granted (rooted). That kind of malware has become popular issue nowadays and it can be said that those malware is very dangerous because of the impact it caused for the user.","PeriodicalId":431878,"journal":{"name":"2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Anonymous sender data to kleptocharger using Android malware\",\"authors\":\"Arief Ikhwanul, S. M. Nasution, Fairuz Azmi\",\"doi\":\"10.1109/ICCEREC.2016.7814956\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Smartphone usage nowadays can't be separated from our daily lives. Almost every daily activity can be supported by smartphone. Aside from its general uses like communication purpose, smartphone also used to store private data. Technological advance also change the way people do their activities, one of them is financial activities. Daily activity be easier with the technology of the internet. Along with the increasing of our needs for smartphone usage, inflict danger about user's data stealing. Some malware have been developed to be a splendid data stealer by utilizing the fault in the system or even in the user itself. The targets of those malware itself are varying. The stolen data can be exploited for their personal use or be sold at the black market and also used for intelligence purposes on a case. What makes world security system concerned is that the malware was designed and developed to be able to communicate with microcontroller device via serial communication. The designer of this malware is able to combine malware and microcontroller to stage his action. Access privilege in the android is very susceptible to exploitation if the super user privilege has been granted (rooted). That kind of malware has become popular issue nowadays and it can be said that those malware is very dangerous because of the impact it caused for the user.\",\"PeriodicalId\":431878,\"journal\":{\"name\":\"2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCEREC.2016.7814956\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEREC.2016.7814956","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Anonymous sender data to kleptocharger using Android malware
Smartphone usage nowadays can't be separated from our daily lives. Almost every daily activity can be supported by smartphone. Aside from its general uses like communication purpose, smartphone also used to store private data. Technological advance also change the way people do their activities, one of them is financial activities. Daily activity be easier with the technology of the internet. Along with the increasing of our needs for smartphone usage, inflict danger about user's data stealing. Some malware have been developed to be a splendid data stealer by utilizing the fault in the system or even in the user itself. The targets of those malware itself are varying. The stolen data can be exploited for their personal use or be sold at the black market and also used for intelligence purposes on a case. What makes world security system concerned is that the malware was designed and developed to be able to communicate with microcontroller device via serial communication. The designer of this malware is able to combine malware and microcontroller to stage his action. Access privilege in the android is very susceptible to exploitation if the super user privilege has been granted (rooted). That kind of malware has become popular issue nowadays and it can be said that those malware is very dangerous because of the impact it caused for the user.