This page is being moved to a new, faster, and mobile-friendly application! Access the enhanced and centralized experience now on MyWorkspace.
ITU's 160 anniversary

Connecting the world and beyond

  •  

ITU-T work programme

[2025-2028] : [SG17] : [Q7/17]

[Declared patent(s)]  - [Associated work]

Work item: X.1130 (ex X.tg-fdma)
Subject/title: Technical guidelines for detecting malicious activities of mobile applications
Status: Determined on 2025-04-17 [Issued from previous study period]
Approval process: TAP
Type of work item: Recommendation
Version: New
Equivalent number: -
Timing: 2025-04 (Medium priority)
Liaison: -
Supporting members: Ant Group Co., Ltd., China Information Communication Technologies Group, vivo Mobile Communication, Alibaba China Co., Ltd., Malaysian Communications and Multimedia Commission
Summary: With the widespread use of mobile devices and applications, APPs have become a primary vector for malicious activities. The attackers gain users’ trust by disguising a malicious app as a legitimate one, thereby obtaining economic benefits. For example, malicious APPs may disguise themselves as legitimate credit or shopping applications to deceive users for financial gain. To detect and prevent such malicious activities, traditional approaches rely on APP Store reviews and alerts from security software installed in the mobile device. However, this solution faces several challenges. While APP Store reviews can help block malicious applications, attackers continuously develop new techniques to evade detection and bypass APP Store reviews. In addition, some malicious applications are distributed through third-party platforms where they entice users to download and install them. Mobile security software primarily focuses on detecting viruses and application vulnerabilities making it difficult to effectively identify malicious applications specifically designed to carry out malicious activities. Malicious applications on mobile devices typically operate through four stages: download, installation, execution, and payment inducement. Each stage presents distinct risks. During the download and installation stage, malicious applications often disguise themselves as legitimate applications to evade detection by security software. They may also implant trojans on the mobile device during this phase. In the execution stage, these applications may steal user information through the implanted trojans or trick users into voluntarily disclosing sensitive data by mimicking legitimate applications. In the payment inducement stage, malicious applications often build trust by offering small rewards or profits through various schemes. Once user trust is established, they lure users into transferring money. In some cases, the deception is direct, for example, by masquerading as legitimate shopping applications to exploit unsuspecting users. The entire process of detecting and preventing malicious activities is highly complex, requiring close coordination between mobile devices and applications. This Recommendation analyses the characteristics and risks of malicious applications across multiple stages, including download, installation, execution and payment inducement, and provides a comprehensive technical solution for detecting and preventing malicious activities, based on the interactions between mobile devices and applications.
Comment: -
Reference(s):
  Historic references:
Contact(s):
Xiaoyuan BAI, Editor
Zhiyuan HU, Editor
Jin PENG, Editor
Weidong WANG, Editor
Wenbiao ZHAO, Editor
ITU-T A.5 justification(s):
Generate A.5 drat TD
-
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2023-09-28 14:50:24
Last update: 2025-12-15 12:47:59