Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3081333.3089293acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
poster

Poster: Sdguard: An Android Application Implementing Privacy Protection and Ransomware Detection

Published: 16 June 2017 Publication History

Abstract

Currently, the smartphone has become an essential communication and amusement tool, which has strong computing power and a variety of functions. Especially, the market share of smartphone with android system account for 84% in 2016[1]. Under android system, a large of privacy data (e.g. photos or videos) are stored in external storage (emulated Sdcard storage), which can be accessed by installed apps. This not only results in privacy leakage but also incurs ransomware attack[2] (e.g. simplocker). Therefore, we present Sdguard, an app, can implement fine-grain permission control based on Linux DAC mechanism and detect ransomware which encrypts content of file stored in external storage or lock user screen. To install Sdguard app, we need to ensure that the smartphone has been rooted and use FUSE filesystem on external storage. During installing, sdcard daemon of android (i.e. FUSE daemon) is replaced by our customized sdcard daemon. After rebooting system, the customized daemon is loaded, and each component of Sdguard is running.

References

[1]
2016. android OS of global smartphone shipments.{Online}. Available: https://www.statista.com/statistics/236027/globalsmartphone-os-market-share-of-android/
[2]
ANDRONIO, N., ZANERO, S., and MAGGI, F., 2015. HelDroid: Dissecting and Detecting Mobile Ransomware. In Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan,November 2--4, 2015. Proceedings, H. BOS, F. MONROSE and G. BLANC Eds. Springer International Publishing, Cham, 382--404.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiSys '17: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services
June 2017
520 pages
ISBN:9781450349284
DOI:10.1145/3081333
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 June 2017

Check for updates

Author Tags

  1. android system
  2. fuse filesystem
  3. permission control
  4. ransomware

Qualifiers

  • Poster

Funding Sources

Conference

MobiSys'17
Sponsor:

Acceptance Rates

MobiSys '17 Paper Acceptance Rate 34 of 188 submissions, 18%;
Overall Acceptance Rate 274 of 1,679 submissions, 16%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)A study of ransomware attacks on windows platformi-manager's Journal on Computer Science10.26634/jcom.9.4.185309:4(21)Online publication date: 2022
  • (2021)Hybrid-Based Analysis Impact on Ransomware Detection for Android SystemsApplied Sciences10.3390/app11221097611:22(10976)Online publication date: 19-Nov-2021
  • (2020)Research on Android Ransomware Protection TechnologyJournal of Physics: Conference Series10.1088/1742-6596/1584/1/0120041584(012004)Online publication date: 17-Jul-2020
  • (2020)A Risk-Driven Model to Minimize the Effects of Human Factors on Smart DevicesEmerging Technologies for Authorization and Authentication10.1007/978-3-030-39749-4_10(156-170)Online publication date: 25-Jan-2020
  • (2019)AN INTELLIGENT CRYPTO-LOCKER RANSOMWARE DETECTION TECHNIQUE USING SUPPORT VECTOR MACHINE CLASSIFICATION AND GREY WOLF OPTIMIZATION ALGORITHMSi-manager’s Journal on Software Engineering10.26634/jse.13.3.1568513:3(15)Online publication date: 2019
  • (2019)Systematic literature review and metadata analysis of ransomware attacks and detection mechanismsJournal of Reliable Intelligent Environments10.1007/s40860-019-00080-3Online publication date: 3-May-2019
  • (2018)RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform2018 IEEE International Conference on Electro/Information Technology (EIT)10.1109/EIT.2018.8500161(0892-0897)Online publication date: May-2018

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media