TY - JOUR
T1 - Counter measuring conceivable security threats on smart healthcare devices
AU - Muzammal, Syeda Mariam
AU - Shah, Munam Ali
AU - Khattak, Hasan Ali
AU - Jabbar, Sohail
AU - Ahmed, Ghufran
AU - Khalid, Shehzad
AU - Hussain, Shahid
AU - Han, Kijun
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2018/4/11
Y1 - 2018/4/11
N2 - Smart devices, the carriers of a huge amount of private, sensitive and confidential data are pervasive in today's world with innovative and enhanced functionalities. Smartphones have brought tremendous change in people's lives with the launch of a new platform of communication and an ease of access to a wide range of applications. Due to the swift increase in the users of Android smartphones and the increasing demands based on advanced ease and features, developers are working hard to achieve the needful. Easy access to certain features and applications gave rise to the powerfulness and an efficacy of various threats, risks and vulnerabilities that can victimize users' private data residing in smartphone paradigm. With the developments and enhancements in malware, for Android-based smartphones, attacks continue to occur. In this paper, we investigate one of the possibly most destructive attacks for Android, that is, screenshot attack. We have developed 'ScreenStealer' application and explored the vulnerabilities which make Android more inclined to risks and threats. Furthermore, we evaluated capture ratio of screenshots, resources consumption and execution time to determine effectiveness, efficiency and stealthiness of such a malicious application.
AB - Smart devices, the carriers of a huge amount of private, sensitive and confidential data are pervasive in today's world with innovative and enhanced functionalities. Smartphones have brought tremendous change in people's lives with the launch of a new platform of communication and an ease of access to a wide range of applications. Due to the swift increase in the users of Android smartphones and the increasing demands based on advanced ease and features, developers are working hard to achieve the needful. Easy access to certain features and applications gave rise to the powerfulness and an efficacy of various threats, risks and vulnerabilities that can victimize users' private data residing in smartphone paradigm. With the developments and enhancements in malware, for Android-based smartphones, attacks continue to occur. In this paper, we investigate one of the possibly most destructive attacks for Android, that is, screenshot attack. We have developed 'ScreenStealer' application and explored the vulnerabilities which make Android more inclined to risks and threats. Furthermore, we evaluated capture ratio of screenshots, resources consumption and execution time to determine effectiveness, efficiency and stealthiness of such a malicious application.
UR - http://www.scopus.com/inward/record.url?scp=85045333734&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85045333734&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2018.2826225
DO - 10.1109/ACCESS.2018.2826225
M3 - Article
AN - SCOPUS:85045333734
SN - 2169-3536
VL - 6
SP - 20722
EP - 20733
JO - IEEE Access
JF - IEEE Access
ER -