Please use this identifier to cite or link to this item: https://rda.sliit.lk/handle/123456789/1146
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMoonamaldeniya, M-
dc.contributor.authorPriyashantha, V. R. S. C-
dc.contributor.authorGunathilake, M. B. N. B-
dc.contributor.authorRansinghe, Y. M. P. B-
dc.contributor.authorRatnayake, A. L. S. D-
dc.contributor.authorAbeygunawardhana, P. K. W-
dc.date.accessioned2022-02-14T08:16:33Z-
dc.date.available2022-02-14T08:16:33Z-
dc.date.issued2021-07-27-
dc.identifier.citationM. Moonamaldeniya, V. R. S. C. Priyashantha, M. B. N. B. Gunathilake, Y. M. P. B. Ransinghe, A. L. S. D. Ratnayake and P. K. W. Abeygunawardhana, "Prevent Data Exfiltration on Smart Phones Using Audio Distortion and Machine Learning," 2021 Moratuwa Engineering Research Conference (MERCon), 2021, pp. 345-350, doi: 10.1109/MERCon52712.2021.9525639.en_US
dc.identifier.issn2691-364X-
dc.identifier.urihttp://rda.sliit.lk/handle/123456789/1146-
dc.description.abstractAttacks on mobile devices have gained a significant amount of attention lately. This is because more and more individuals are switching to smartphones from traditional non-smartphones. Therefore, attackers or cybercriminals are now getting on the bandwagon to have an opportunity at obtaining information stored on smartphones. In this paper, we present an Android mobile application that will aid to minimize data exfiltration from attacks, such as, Acoustic Side-Channel Attack, Clipboard Jacking, Permission Misuse and Malicious Apps. This paper will commence its inception with an introduction explaining the current issues in general and how attacks such as side-channel attacks and clipboard jacking paved the way for data exfiltration. We will also discuss a few already existing solutions that try to mitigate these problems. Moving on to the methodology we will emphasize how we came about the solution and what methods we followed to achieve the end goal of securing the smartphone. In the final section, we will discuss the outcomes of the project and conclude what needs to be done in the future to enhance this project so that this mobile application will continue to keep the user's data safe from the criminals' grasps.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartofseries2021 Moratuwa Engineering Research Conference (MERCon);Pages 345-350-
dc.subjectPrevent Dataen_US
dc.subjectPrevent Data Exfiltrationen_US
dc.subjectSmart Phonesen_US
dc.subjectAudio Distortionen_US
dc.subjectMachine Learningen_US
dc.titlePrevent Data Exfiltration on Smart Phones Using Audio Distortion and Machine Learningen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/MERCon52712.2021.9525639en_US
Appears in Collections:Department of Computer systems Engineering-Scopes
Research Papers - Dept of Computer Systems Engineering
Research Papers - SLIIT Staff Publications

Files in This Item:
File Description SizeFormat 
Prevent_Data_Exfiltration_on_Smart_Phones_Using_Audio_Distortion_and_Machine_Learning.pdf
  Until 2050-12-31
4.01 MBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.