{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:17:43Z","timestamp":1763457463952},"reference-count":11,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"name":"TELUS Corporation"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2015]]},"abstract":"<jats:p>Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS) that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.<\/jats:p>","DOI":"10.1155\/2015\/746930","type":"journal-article","created":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T16:03:27Z","timestamp":1424793807000},"page":"1-13","source":"Crossref","is-referenced-by-count":6,"title":["Messaging Attacks on Android: Vulnerabilities and Intrusion Detection"],"prefix":"10.1155","volume":"2015","author":[{"given":"Khodor","family":"Hamandi","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon"}]},{"given":"Alaa","family":"Salman","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon"}]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon"}]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon"}]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon"}]}],"member":"98","reference":[{"key":"3","year":"2011"},{"key":"4","year":"2012"},{"key":"8","year":"2012"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.05.002"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.11.050"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.3233\/jcs-2007-0308"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03964-5_6"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18178-8_30"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.03.009"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.03.046"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17758-3_17"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2015\/746930.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2015\/746930.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2015\/746930.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,7,27]],"date-time":"2016-07-27T18:53:49Z","timestamp":1469645629000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/misy\/2015\/746930\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":11,"alternative-id":["746930","746930"],"URL":"https:\/\/doi.org\/10.1155\/2015\/746930","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"value":"1574-017X","type":"print"},{"value":"1875-905X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}