Print Email Facebook Twitter Dynamic analysis of Android applications to extract spam caller IDs Title Dynamic analysis of Android applications to extract spam caller IDs Author van Luik, Christiaan (TU Delft Electrical Engineering, Mathematics and Computer Science; TU Delft Cyber Security) Contributor Zarras, A. (mentor) Zhauniarovich, Y. (mentor) Houben, G.J.P.M. (graduation committee) Degree granting institution Delft University of Technology Programme Computer Science and Engineering Project CSE3000 Research Project Date 2022-06-23 Abstract Spam calls are becoming an increasing problem, with people receiving multiple spam calls per month on average. Multiple Android applications exist that are able to detect spam calls and display a warning or block such calls. Little is known however on how these applications work and what numbers they block.In this research, the following question is investigated: Can we do a brute force dynamic analysis on Android spam call blocking apps, to extract caller ID information from apps that cannot be or is not extracted through static analysis? A tool is created that is capable of doing such a dynamic analysis, by installing such an app on an emulator, sending emulated phone calls to the emulator, and using screenshot comparison techniques to determine whether the call is classified as allowed or blocked by the respective app. The tool developed in this research can, fully automated, test caller IDs on 8 different Android apps. Apart from a number of initial setup steps to install and configure the apps in the emulator, the tool takes about 1.5 seconds on average to analyze 1 caller IDs on one app. Subject spam call analysisAndroidDynamic Analysis To reference this document use: http://resolver.tudelft.nl/uuid:18895e38-531e-4aee-9044-2e72fd155381 Part of collection Student theses Document type bachelor thesis Rights © 2022 Christiaan van Luik Files PDF research_paper_spam_call_ ... alysis.pdf 888.67 KB Close viewer /islandora/object/uuid:18895e38-531e-4aee-9044-2e72fd155381/datastream/OBJ/view