Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.5.975

A Study on Smishing Block of Android Platform Environment  

Lee, Si-Young (Center for Information Security Technologies, Korea University)
Kang, Hee-Soo (Center for Information Security Technologies, Korea University)
Moon, Jong-Sub (Center for Information Security Technologies, Korea University)
Abstract
As financial transactions with a smartphone has become increasing, a myriad of security threats have emerged against smartphones. Among the many types of security threats, Smishing has evolved to be more sophisticated and diverse in design. Therefore, financial institutions have recommended that users doesn't install applications with setting of "Unknown sources" in the system settings menu and install application which detects Smishing. Unfortunately, these kind of methods come with their own limitations and they have not been very effective in handling Smishing. In this paper, we propose a systematic method to detect Smishing, in which the RIL(Radio Interface Layer) collects a text message received and then, checks if message databases stores text message in order to determine whether Smishing malware has been installed on the system. If found, a system call (also known as a hook) is used to block the outgoing text message generated by the malware. This scheme was found to be effective in preventing Smishing as found in our implementation.
Keywords
Smishing; Malware; RIL; LKM;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Kaspersky Lab, "Kaspersky Security Bulletin 2013, Overall Statistics for 2013," http://media.kaspersky.com/pdf/KSB_2013_EN.pdf.
2 ZDNET Korea, "AhnLAB, New version of malware 'chest' is rapidly increasing," http://www.zdnet.co.kr/news/news_view.asp?artice_id=20130307162220, Mar. 2013.
3 Smishing, http://www.police.go.kr/portal/main/contents.do?menuNo=200287
4 N. Megiddo, P. Alto, and K. S. McCurley, "Efficient Retrieval of Uniform Resource Locators," U.S. Patent No. 6957224 B1, Oct. 2005.
5 D. Antoniades, I. Polakis, G. Kontaxis, E. Athanasopoulos, S. Ioannidis, E.P.Markatos and T. Karagiannis, "We.b: the web of short urls," WWW '11 Proceedings of the 20th international conference on World wide web, pp. 715-724, Mar. 2011.
6 Nprotect response team official blog, " circulation of APK using mobile messenger," http://erteam.nprotect.com/464.
7 Soonil Kim, Sunghoon Kim and Donghoon Lee, "A study on the vulnerability of integrity verification functions of android- based smartphone banking applications," Journal of The Korea Institute of Information Security & Cryptology, 23(4), pp. 743-755, Aug. 2013.   과학기술학회마을   DOI
8 3GPP, "3GPP TS 23.040 - Technical realization of the Short Message Service(SMS)," 3GPP, Dec. 2013.
9 Radio Layer Interface, http://www.kandroid.org/online-pdk/guide/telephony.html.
10 Collin Mulliner and Charlie Miller, "Injecting SMS Messages into Smart Phones for Security Analysis," WOOT'09 Proceedings of the 3rd USENIX confer ence on Offensive technologies, pp. 5-5, Aug. 2009.
11 Peter Jay Salzman, Michael Burian and Ori Pomerantz, "The Linux Kernel Module Programming Guide," http://www.tldp.org/LDP/lkmpg/2.6/lkmpg.pdf, May. 2007.
12 Youngseok Choi, Sunghoon Kim and Donghoon Lee, "Study to detect and block leakage of personal information : Android-platform environment," Journal of The Korea Institute of Information Security & Cryptology, 23(4), pp. 757-766, Aug. 2013.   과학기술학회마을   DOI   ScienceOn
13 Jeonghyeok Kim and Moonsun Bae, "Utilization status of domestic Online banking in 2013," The Bank of Korea, Feb. 2014.
14 Chao Yang, Vinod Yegneswaran, Phillip Porras and Guofei Gu, "Detecting money- stealing apps in alternative Android markets," CCS '12 Proceedings of the 2012 ACM conference on Computer and communications security, pp. 1034-1036, Oct. 2012.
15 SMSC, http://en.wikipedia.org/wiki/Short_message_service_center.
16 Vibha Manjunath and Martin Colley ,"Reverse Engineering Of Malware On Android," 2011 The SANS Institute, Aug. 2011.
17 W. Enck, M. Ongtang, and P. McDaniel, "On Lightweight Mobile Phone Application Certification," Proceeding CCS '09 Proceedings of the 16th ACM conference on Computer and communications security, pp. 235-245, May. 2009.
18 Sangho Park and Junhyeong Lee, "Proposal of Smishing Prevention System through Android Permission and Authentication," KIISC REVIEW, 23(6), pp. 5-12, Dec. 2013.
19 Tiago Almeida, Jose Maria Gomez Hidalgo, Tiago Pasqualini Silva, "Towards SMS Spam Filtering: Results under a New Dataset," International Journal of Information Security Science, vol. 2 no. 1, pp. 1-18, Mar. 2013.
20 Tae Oh, Bill Stackpole, Emily Cummins, Carlos Gonzalez and Rahul Ramachandran, "Best Security Practices for Android, BlackBerry, and iOS," Enabling Technologies for Smartphone and Internet of Things (ETSIoT), 2012 First IEEE Workshop on, pp. 42-47, Jun. 2012.
21 Anna Kang, Jaedong Lee, Wonmin Kang, Leonard Barolli and Jonghyuk Park, "Security Considerations for Smart Phone Smishing Attacks," Advances in Computer Science and its Applications, Lecture Notes in Electrical Engineering vol. 279, pp. 467-473, 2014