An example of how a mobile (Android) application that performs a useful function could contain hidden malicious software (CPS633 - Lab #4)..
Android-SMS-Listener is hosted in the following web site
https://github.com/nsalerni/Android-SMS-Listener
If you think the Android project Android-SMS-Listener listed in this page is inappropriate, such as containing malicious code/tools or violating the copyright, please email info at java2s dot com, thanks.
The following table is the detailed list of Android-SMS-Listener.
Item | Value |
---|---|
Java File Count | 3 |
Minimum SDK Version | 8 |
Activity Count | 1 |
Required Permissions | android.permission.READ_SMS android.permission.RECEIVE_SMS android.permission.SEND_SMS |
Android-SMS-Listener has the following Java source files.
com.example.nsalerni.smslistener.ApplicationTest.java com.example.nsalerni.smslistener.MainActivity.java com.example.nsalerni.smslistener.SMSListener.java