
International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 7 Issue 2
March-April 2025
Indexing Partners



















Identifying Threats in Android: Detection Techniques for Malicious Accessibility Service Exploits
Author(s) | Jeffrie Joshua Lazarus George |
---|---|
Country | United States |
Abstract | Mobile malware targeting Android devices has expanded at a tremendous rate and poses several new challenges to Android cybersecurity researchers and developers. Of these threats, Android’s Accessibility Service has become an increasingly prevalent one where a malicious application can take control of user interaction, steal sensitive information, or bypass security measures. Accessibility Service was created to help users with disabilities, however, these days its code is violated by Trojan bankers, spyware, and ransomware to make unauthorized transactions, steal credentials, and make modifications to data. Cybercriminals who target Android keep on improving their techniques and moving faster than security frameworks improved even though we are trying hard to strengthen their security frameworks. The detection methodologies discussed in this paper are those concerning Anti Accessibility Service-based malware. In this paper, we present a study based on an analysis of real-world malware families, namely Anubis and TeaBot, that demonstrates several identified indicators of malicious behavior, e.g., suspicious permissions used, events monitored, and overlay attacks. Further, the paper also discusses the ability of static and dynamic analysis techniques to detect threats and class the challenges involved with discriminating legitimate accessibility programs from malware. Concerning future progression, the study also proposes AI-driven detection models and Behavior-based security measures for malware identification and prevention. By practicing the best practices of permission management, developers can help make Android security stronger, and corresponding users are advised to be vigilant with their security of suspicious applications. Strict app review policies must be implemented by regulatory bodies and cybersecurity firms have to find a way to enhance automated threat detection mechanisms in collaboration. When these strategies are integrated into Android’s environment users are better protected against the evolving threats of malware, also legitimate system features such as Accessibility Service can not be abused. |
Keywords | Android malware, AccessibilityService exploits, Trojan bankers, mobile security, malware detection, AI-driven threat analysis, dynamic analysis, overlay attacks, cybersecurity, permission abuse |
Field | Computer > Network / Security |
Published In | Volume 7, Issue 1, January-February 2025 |
Published On | 2025-02-23 |
DOI | https://doi.org/10.36948/ijfmr.2025.v07i01.37553 |
Short DOI | https://doi.org/g854jf |
Share this

E-ISSN 2582-2160

CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
