Volatile memory-centric investigation of SMS-hijacked phones: A pushbullet case study

5Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Cloak-and-Dagger attacks targeting Android devices can completely hijack the UI feedback loop, with one possible consequence being that of hijacking SMS functionality for cybercrime purposes. What is of particular concern is that attackers can decouple stealth activities from SMS hijacking. Consequently the latter could be pulled off using completely legitimate apps that normally would allow users to manage text messages from their personal computers (SMSonPC), but this time all hidden away under attacker control. This work proposes a digital investigation process aiming to uncover SMS-hijacked devices. It uses byte code instrumentation in order to force the dumping of volatile memory areas where evidence for the hijack can be located. Eventually both the mal ware that conceals the SMS-hijacking and the compromised or smuggled SMSonPC app can be identified. Preliminary results are presented using a case study based on the popular SMSonPC app: Pushbullet.

Cite

CITATION STYLE

APA

Vella, M., & Rudramurthy, V. (2018). Volatile memory-centric investigation of SMS-hijacked phones: A pushbullet case study. In Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018 (pp. 607–616). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.15439/2018F11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free