{"title":"针对android设备的克隆移动恶意软件应用回顾","authors":"M. Baykara, Eren Çolak","doi":"10.1109/ISDFS.2018.8355388","DOIUrl":null,"url":null,"abstract":"With the increased mobile applications popularity, fraud methods have become a big problem in this area. Every smartphone definitely has at least one mobile application. These applications, which are constantly connected to the Internet, can threaten our security. Unfortunately, mobile applications still have a lot of vulnerabilities. It has been determined that 96% of the security tests on mobile released applications fail at least one test. This paper focuses on the threat of malware cloned applications and the damage caused to the affected Android users. An explanation of how the cloned malware applications affecting Android users is provided. In addition, a presentation of the awareness steps that users can take to notice these applications is given.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"A review of cloned mobile malware applications for android devices\",\"authors\":\"M. Baykara, Eren Çolak\",\"doi\":\"10.1109/ISDFS.2018.8355388\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the increased mobile applications popularity, fraud methods have become a big problem in this area. Every smartphone definitely has at least one mobile application. These applications, which are constantly connected to the Internet, can threaten our security. Unfortunately, mobile applications still have a lot of vulnerabilities. It has been determined that 96% of the security tests on mobile released applications fail at least one test. This paper focuses on the threat of malware cloned applications and the damage caused to the affected Android users. An explanation of how the cloned malware applications affecting Android users is provided. In addition, a presentation of the awareness steps that users can take to notice these applications is given.\",\"PeriodicalId\":154279,\"journal\":{\"name\":\"2018 6th International Symposium on Digital Forensic and Security (ISDFS)\",\"volume\":\"86 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 6th International Symposium on Digital Forensic and Security (ISDFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDFS.2018.8355388\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS.2018.8355388","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A review of cloned mobile malware applications for android devices
With the increased mobile applications popularity, fraud methods have become a big problem in this area. Every smartphone definitely has at least one mobile application. These applications, which are constantly connected to the Internet, can threaten our security. Unfortunately, mobile applications still have a lot of vulnerabilities. It has been determined that 96% of the security tests on mobile released applications fail at least one test. This paper focuses on the threat of malware cloned applications and the damage caused to the affected Android users. An explanation of how the cloned malware applications affecting Android users is provided. In addition, a presentation of the awareness steps that users can take to notice these applications is given.