Protecting Android based applications from malware affected through SMS messages

J. Sasi Bhanu, J. K. R. Sastry, T. Chandrasekhara Reddy


Users use Android-based applications for communicating through emailing, text messaging, and transmission of audio and video objects. The attackers manipulate the email, text, videos, or audio so that users' receipt of the messages causes malware through their handheld devices. A runtime routine is invoked, which causes damage to the local resources of the mobile phone. The manipulation of the messages is done using different signatures, making it difficult to recognize the same using a single approach. Multiple approaches are sometimes required to detect different signature-based incoming messages. Choosing a method that suits the signature of the incoming message is the key. Malware can also enter at the time of installing third-party apps, clicking on the links provided in the messages, installing and invoking the malware in the background. Many issues are involved in dealing with malware detecting, prevention, and curing. A comprehensive architecture is required to deal with every aspect of dealing malware. In this paper, a comprehensive architecture is presented that considers malware's issue, especially concerning malware affected through short message service (SMS) messages operated under the Android operating system. The disection of the SMS messages have been implemented and 99% accuracy has been achieved.


Android; malware; malware architecture; malware detection; messaging systems;

Full Text:




  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

shopify stats IJEECS visitor statistics