An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability

Huda Abualola, Hessa Alhawai, Maha Kadadha, Hadi Otrok, Azzam Mourad

Research output: Contribution to journalConference articlepeer-review

11 Scopus citations

Abstract

Security attacks continue to emerge on daily basis due to the fast growth in the number of smart devices and mobile applications. Attacks take different malware forms such as Spyware and Trojan exploiting different operating system vulnerabilities, specially the well known vulnerable operating system; Android OS. In this paper, we study the malicious use of the "NotificationListener" service in Android 4.3 and 5.0. A Trojan application, known as SMS backup, is developed to spy the notifications of other applications. Such an application requires only two permissions that include "Notification Access" and "Internet". These permissions are used to extract and send user's messages of other applications to the attacker's email through Internet. Our malware is able to alter and/or delete the notification before being displayed. For experimental results, the malware was tested against notifications of WhatsApp, BBM, SMS, and Facebook messenger using different Android versions including Lollipop 5.0. Experiments show that our malware succeeded against all the tested applications running Android version 4.3. Moreover, BBM and SMS messages are still extractable in the newer version of Android (Lollipop 5.0).

Original languageBritish English
Pages (from-to)465-471
Number of pages7
JournalProcedia Computer Science
Volume83
DOIs
StatePublished - 2016
Event7th International Conference on Ambient Systems, Networks and Technologies, ANT 2016 and the 6th International Conference on Sustainable Energy Information Technology, SEIT 2016 - Madrid, Spain
Duration: 23 May 201626 May 2016

Keywords

  • Android
  • Mobile spy
  • Notification
  • Spyware
  • Trojan

Fingerprint

Dive into the research topics of 'An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability'. Together they form a unique fingerprint.

Cite this