Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept.
Madihah Mohd SaudiFarida RidzuanNurlida BasirN. F. NabilaSakinah Ali PitchayIntan Nurfarahin AhmadPublished in: UKSim (2015)
Keyphrases
- mobile devices
- malware detection
- mobile applications
- smart phones
- location aware
- android application
- mobile platforms
- mobile platform
- mobile apps
- mobile phone
- mobile computing
- detect malicious
- malicious code
- handheld devices
- mobile technologies
- android platform
- context aware
- mobile networks
- mobile environments
- reverse engineering
- mobile users
- mobile learning
- surveillance system
- real time
- mobile robot
- m learning
- mobile communication
- mobile services
- log analysis
- wifi