{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T10:10:08Z","timestamp":1755857408874,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T00:00:00Z","timestamp":1679616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,24]]},"DOI":"10.1145\/3592307.3592341","type":"proceedings-article","created":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T13:30:46Z","timestamp":1692019846000},"page":"213-219","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploitation Simulation of DNS Spoofing and Ransomware In a Virtualized Android Device"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7189-3040","authenticated-orcid":false,"given":"Eric","family":"Blancaflor","sequence":"first","affiliation":[{"name":"School of I.T., Mapua University, Philippines"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4653-9760","authenticated-orcid":false,"given":"Reymart","family":"Ambayon","sequence":"additional","affiliation":[{"name":"School of I.T., Mapua University, Philippines"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7103-9509","authenticated-orcid":false,"given":"El Simon","family":"Gran","sequence":"additional","affiliation":[{"name":"School of I.T., Mapua University, Philippines"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5058-898X","authenticated-orcid":false,"given":"Daniel-Day","family":"Medallo","sequence":"additional","affiliation":[{"name":"School of I.T., Mapua University, Philippines"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2736-204X","authenticated-orcid":false,"given":"Ralph Joaquin","family":"Ramirez","sequence":"additional","affiliation":[{"name":"School of I.T., Mapua University, Philippines"}]}],"member":"320","published-online":{"date-parts":[[2023,8,14]]},"reference":[{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_1_1","unstructured":"Mimecast. 2020. What is Ransomware? Retrieved October 18, 2022 from https:\/\/www.mimecast.com\/content\/what-is-ransomware\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Whac-A-Mole: Six Years of DNS Spoofing Retrieved","author":"Cryptography","year":"2022","unstructured":"Cryptography and Security 2020. Whac-A-Mole: Six Years of DNS Spoofing Retrieved October 18, 2022 from https:\/\/arxiv.org\/abs\/2011.12978"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"Kozlenko Mykola","year":"2022","unstructured":"Mykola Kozlenko, Valerii Tkachuk, and \u041c\u0438\u043a\u043e\u043b\u0430 \u0406\u0432\u0430\u043d\u043e\u0432\u0438\u0447 \u041a\u043e\u0437\u043b\u0435\u043d\u043a\u043e. 2019. Deep learning based detection of DNS spoofing attack. (December 2019). Retrieved October 27, 2022 from http:\/\/lib.pnu.edu.ua:8080\/handle\/123456789\/8330"},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","author":"Faruki Parvez","year":"2014","unstructured":"Parvez Faruki 2014. Android Security: A survey of issues, malware penetration, and defenses. (December 2014). Retrieved October 26, 2022 from https:\/\/ieeexplore.ieee.org\/abstract\/document\/6999911"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"Wallen Jack","year":"2022","unstructured":"Jack Wallen, TechRepublic Staff, Mary Branscombe, Megan Crouse, and Kihara Kimachia. 2022. Why is Android more popular globally, while IOS rules the US? (September 2022). Retrieved October 26, 2022 from https:\/\/www.techrepublic.com\/article\/why-is-android-more-popular-globally-while-ios-rules-the-us\/#:\u223c:text=The%20primary%20reason%20why%20Android,simply%20cannot%20compete%20with%20Google."},{"key":"e_1_3_2_1_6_1","volume-title":"Retrieved","author":"Wise Jason","year":"2022","unstructured":"Jason Wise. 2022. How many people use Android phones in 2022? (full stats). (August 2022). Retrieved October 26, 2022 from https:\/\/earthweb.com\/how-many-people-use-android\/"},{"key":"e_1_3_2_1_7_1","volume-title":"Retrieved","author":"Techonologies Sangfor","year":"2022","unstructured":"Sangfor Techonologies. 2022. Malicious apps are targeting online banking customers. (April 2022). Retrieved October 26, 2022 from https:\/\/www.sangfor.com\/blog\/cybersecurity\/malicious-apps-are-targeting-online-banking-customers"},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","author":"Judy","year":"2022","unstructured":"Judy A. Selby and Jonathan A. Forman. 2015. 'C' is for cybersecurity. (June 2015). Retrieved October 26, 2022 from https:\/\/www.law.com\/legaltechnews\/almID\/1202728196571\/"},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"Wallen Jack","year":"2022","unstructured":"Jack Wallen, TechRepublic Staff, Mary Branscombe, Megan Crouse, and Kihara Kimachia. 2022. Why is Android more popular globally, while IOS rules the US? (September 2022). Retrieved October 26, 2022 from https:\/\/www.techrepublic.com\/article\/why-is-android-more-popular-globally-while-ios-rules-the-us\/#:\u223c:text=The%20primary%20reason%20why%20Android,simply%20cannot%20compete%20with%20Google."},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved","author":"Baykara Muhammet","year":"2018","unstructured":"Muhammet Baykara and Eren \u00c7olak. 2018. A review of cloned mobile malware applications for Android devices. (March 2018). Retrieved October 26, 2022 from https:\/\/ieeexplore.ieee.org\/document\/8355388\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2017.8229907"},{"key":"e_1_3_2_1_12_1","volume-title":"Retrieved","author":"Whitney Lance","year":"2022","unstructured":"Lance Whitney, TechRepublic Staff, Mary Branscombe, Megan Crouse, and Kihara Kimachia. 2022. Malicious Android apps found masquerading as legitimate antivirus tools. (April 2022). Retrieved October 26, 2022 from https:\/\/www.techrepublic.com\/article\/malicious-android-apps-masquerading-as-av\/"},{"key":"e_1_3_2_1_13_1","volume-title":"Retrieved","author":"Europa Europol","year":"2022","unstructured":"Europol Europa. 2022. European cybercrime centre - EC3. (March 2022). Retrieved October 26, 2022 from https:\/\/www.europol.europa.eu\/sites\/default\/files\/documents\/infographic_-_mobile_ransomware.pdf"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2014.46"},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved","author":"Whitney Lance","year":"2020","unstructured":"Lance Whitney, TechRepublic Staff, Mary Branscombe, Megan Crouse, and Kihara Kimachia. 2020. Covidlock ransomware exploits coronavirus with malicious Android app. (March 2020). Retrieved October 26, 2022 from https:\/\/www.techrepublic.com\/article\/covidlock-ransomware-exploits-coronavirus-with-malicious-android-app\/"},{"volume-title":"Retrieved","year":"2022","key":"e_1_3_2_1_16_1","unstructured":"DomainTools. 2022. CovidLock: Mobile Coronavirus Tracking app coughs up ransomware - domaintools: Start here. know now. (July 2022). Retrieved October 26, 2022 from https:\/\/www.domaintools.com\/resources\/blog\/covidlock-mobile-coronavirus-tracking-app-coughs-up-ransomware\/"},{"key":"e_1_3_2_1_17_1","volume-title":"Retrieved","author":"Graham","year":"2014","unstructured":"Graham CLULEY. 2014. Koler Android malware demands $300 ransom from its victims. (May 2014). Retrieved October 26, 2022 from https:\/\/www.bitdefender.com\/blog\/hotforsecurity\/koler-android-malware-demands-300-ransom-from-its-victims"},{"key":"e_1_3_2_1_18_1","volume-title":"Retrieved","author":"Micro Trend","year":"2018","unstructured":"Trend Micro. 2018. XLoader Android spyware and banking trojan distributed via DNS spoofing. (April 2018). Retrieved October 26, 2022 from https:\/\/www.trendmicro.com\/en_ph\/research\/18\/d\/xloader-android-spyware-and-banking-trojan-distributed-via-dns-spoofing.html"},{"key":"e_1_3_2_1_19_1","author":"Hacker Cyware","year":"2019","unstructured":"Cyware Hacker News. 2019. XLoader: A deep insight into the Android malware's various campaigns: Cyware Hacker News. (April 2019). Retrieved October 26, 2022 from https:\/\/cyware.com\/news\/xloader-a-deep-insight-into-the-android-malwares-various-campaigns-462d6020","journal-title":"News."}],"event":{"name":"ICECC 2023: 2023 The 6th International Conference on Electronics, Communications and Control Engineering","acronym":"ICECC 2023","location":"Fukuoka Japan"},"container-title":["Proceedings of the 2023 6th International Conference on Electronics, Communications and Control Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592307.3592341","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3592307.3592341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T09:32:54Z","timestamp":1755855174000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592307.3592341"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,24]]},"references-count":19,"alternative-id":["10.1145\/3592307.3592341","10.1145\/3592307"],"URL":"https:\/\/doi.org\/10.1145\/3592307.3592341","relation":{},"subject":[],"published":{"date-parts":[[2023,3,24]]},"assertion":[{"value":"2023-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}