Detection of Social Media Exploitation via SMS and Camera
DOI:
https://doi.org/10.3991/ijim.v13i04.10521Keywords:
Social media exploitation, API, permission, SMS, camera, mobile malwares, mobile phone surveillance featureAbstract
Internet users all over the world are highly exposed to social media exploitation, where they are vulnerable to be targeted by this cyber-attack. Furthermore, excessive use of social media leads to Internet Addiction Disorder (IAD). Fortunately, social media exploitation and IAD can be monitored and controlled closely based on user’s mobile phone surveillance features which are camera, SMS, audio, geolocation (GPS) and call log. Hence to overcome these challenges, this paper presents five (5) Application Programming Interfaces (APIs) and four (4) permissions for SMS and camera that are mostly and widely used with the social media applications. These 9 APIs and permissions matched with 2.7% of the APIs and permissions training dataset that are related with SMS and camera. This experiment was conducted by using hybrid analysis, which inclusive of static analysis and dynamic analysis, with 1926 training dataset from Brunswick. These 9 APIs and permissions, if being misused by the attacker, could lead to privacy concerns of a mobile device. The finding from this paper can be used as a guidance and reference for the formation of new mobile malware detection technique and modeling in future.
Downloads
Published
2019-04-10
How to Cite
Adib Azhar, M., Mohd Saudi, M., Ahmad, A., & Abu Bakar, A. (2019). Detection of Social Media Exploitation via SMS and Camera. International Journal of Interactive Mobile Technologies (iJIM), 13(04), pp. 61–79. https://doi.org/10.3991/ijim.v13i04.10521
Issue
Section
Papers