<?xml version="1.0"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-05-18T22:20:40Z</responseDate><request verb="GetRecord" metadataPrefix="oai_dc">https://keep.lib.asu.edu/oai/request</request><GetRecord><record><header><identifier>oai:keep.lib.asu.edu:node-137724</identifier><datestamp>2024-12-19T17:04:35Z</datestamp><setSpec>oai_pmh:all</setSpec><setSpec>oai_pmh:repo_items</setSpec></header><metadata><oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><dc:identifier>137724</dc:identifier>
          <dc:identifier>https://hdl.handle.net/2286/R.I.16930</dc:identifier>
                  <dc:rights>http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
                  <dc:date>2013-05</dc:date>
                  <dc:format>72 pages</dc:format>
                  <dc:language>eng</dc:language>
                  <dc:contributor>Romo, James Tyler</dc:contributor>
          <dc:contributor>Rezende, Bryan</dc:contributor>
          <dc:contributor>Whitaker, Jeremy</dc:contributor>
          <dc:contributor>Ahn, Gail-Joon</dc:contributor>
          <dc:contributor>Wilkerson, Kelly</dc:contributor>
          <dc:contributor>Conquest, Kevin</dc:contributor>
          <dc:contributor>Barrett, The Honors College</dc:contributor>
          <dc:contributor>Computer Science and Engineering Program</dc:contributor>
                  <dc:type>Text</dc:type>
                  <dc:description>Over the past several years, the three major mobile platforms have seen&lt;br/&gt;tremendous growth and success; as a result, the platforms have been the target&lt;br/&gt;of many malicious attacks. These attacks often request certain permissions in&lt;br/&gt;order to carry out the malicious activities, and uninformed users usually grant&lt;br/&gt;them. One prevalent example of this type of malware is one that requests&lt;br/&gt;permission  to  the  device’s  SMS  service,  and  once  obtained,  uses  the  SMS &lt;br/&gt;service to accrue charges to the user. This type of attack is one of the most&lt;br/&gt;prevalent on the Android application marketplace, and requires a long-term&lt;br/&gt;solution. Replication of an attack is necessary to fully understand efficient&lt;br/&gt;prevention methods, and due to the open-source nature of Android development,&lt;br/&gt;to determine the likely mechanics of the attack as feasible.&lt;br/&gt;This study uses the Hacker News application, an open source application&lt;br/&gt;that is available for download through GitHub as a basis for creating a malware&lt;br/&gt;application to study the SMS attack and explore prevention methods. From the&lt;br/&gt;results and knowledge gained from both research and experimentation, a&lt;br/&gt;proposition for a more secure operating system architecture was defined to&lt;br/&gt;prevent and mitigate various attacks on mobile systems with a focus on SMS&lt;br/&gt;attacks.</dc:description>
                  <dc:subject>Mobile Security</dc:subject>
          <dc:subject>Smartphones</dc:subject>
          <dc:subject>Malware</dc:subject>
                  <dc:title>Perceived Confidentiality of Mobile Application Data</dc:title></oai_dc:dc></metadata></record></GetRecord></OAI-PMH>
