Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/1146
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Moonamaldeniya, M | - |
dc.contributor.author | Priyashantha, V. R. S. C | - |
dc.contributor.author | Gunathilake, M. B. N. B | - |
dc.contributor.author | Ransinghe, Y. M. P. B | - |
dc.contributor.author | Ratnayake, A. L. S. D | - |
dc.contributor.author | Abeygunawardhana, P. K. W | - |
dc.date.accessioned | 2022-02-14T08:16:33Z | - |
dc.date.available | 2022-02-14T08:16:33Z | - |
dc.date.issued | 2021-07-27 | - |
dc.identifier.citation | M. Moonamaldeniya, V. R. S. C. Priyashantha, M. B. N. B. Gunathilake, Y. M. P. B. Ransinghe, A. L. S. D. Ratnayake and P. K. W. Abeygunawardhana, "Prevent Data Exfiltration on Smart Phones Using Audio Distortion and Machine Learning," 2021 Moratuwa Engineering Research Conference (MERCon), 2021, pp. 345-350, doi: 10.1109/MERCon52712.2021.9525639. | en_US |
dc.identifier.issn | 2691-364X | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/1146 | - |
dc.description.abstract | Attacks on mobile devices have gained a significant amount of attention lately. This is because more and more individuals are switching to smartphones from traditional non-smartphones. Therefore, attackers or cybercriminals are now getting on the bandwagon to have an opportunity at obtaining information stored on smartphones. In this paper, we present an Android mobile application that will aid to minimize data exfiltration from attacks, such as, Acoustic Side-Channel Attack, Clipboard Jacking, Permission Misuse and Malicious Apps. This paper will commence its inception with an introduction explaining the current issues in general and how attacks such as side-channel attacks and clipboard jacking paved the way for data exfiltration. We will also discuss a few already existing solutions that try to mitigate these problems. Moving on to the methodology we will emphasize how we came about the solution and what methods we followed to achieve the end goal of securing the smartphone. In the final section, we will discuss the outcomes of the project and conclude what needs to be done in the future to enhance this project so that this mobile application will continue to keep the user's data safe from the criminals' grasps. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | 2021 Moratuwa Engineering Research Conference (MERCon);Pages 345-350 | - |
dc.subject | Prevent Data | en_US |
dc.subject | Prevent Data Exfiltration | en_US |
dc.subject | Smart Phones | en_US |
dc.subject | Audio Distortion | en_US |
dc.subject | Machine Learning | en_US |
dc.title | Prevent Data Exfiltration on Smart Phones Using Audio Distortion and Machine Learning | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/MERCon52712.2021.9525639 | en_US |
Appears in Collections: | Department of Computer systems Engineering-Scopes Research Papers - Dept of Computer Systems Engineering Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Prevent_Data_Exfiltration_on_Smart_Phones_Using_Audio_Distortion_and_Machine_Learning.pdf Until 2050-12-31 | 4.01 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.