A Survey on mobile malware: War without end

Sonal Mohite

Abstract


These days’ mobile devices are an inseparable part of our everyday lives and in preceding years its usage has grown-up exponentially. With the functionality upgrade of mobile phones, the malware threat for mobile phones is expected to increase. This threat got worse with the fast internet access which provides attractive targets for malware developers. The growth of smart phone usage can also be directly linked to its capability to support third-party applications that are offered through online application markets. Therefore, smart phones now represent a supreme objective for malware writers. Evolution, propagation, detection & control of mobile malware are to be explored.


Keywords


Malware control, malware detection, mobile malware, malware propagation.

Full Text:

PDF

References


M. La Polla, F. Martinelli, and D. Sgandurra, “A Survey on Security for Mobile Devicesâ€, IEEE Communications Surveys & Tutorials, IEEE 2012.

Kaspersky Lab IT Threat Evolution: Q2 2013, [online] http://www.kaspersky.co.in/about/news/virus/2013/kaspersky_lab_it_threat_evolution_q2_2013.

A. Gostev, “Mobile Malware Evolution: An Overview, Part 1â€, [online], http://www.securelist.com/en/analysis ?pubid=200119916.

D. Maslennikov, “Mobile Malware Evolution: Part 6†[online], http://www.securelist.com/en/analysis/ 204792283/Mobile_Malware_Evolution_Part_6.

C. Gao and J. Liu, “Modeling and restraining mobile virus propagationâ€, IEEE transactions on mobile computing, Vol. 12, No. 3, March 2013.

C. Gao, j. Liu, and N. Zhong, “Network immunization and virus propagation in Email networks: experimental evaluation and analysis,†Knowledge and information systems, vol. 27, no. 2, pp. 253-279, 2011.

G. Yan and S. Eidenbenz, “Modeling propagation dynamics of Bluetooth worms (extended version),†IEEE transactions on Mobile Computing, Vol. 8, No. 3, pp. 353-368, March 2009.

M. C. Gonzalez, C. A. Hidalgo, and A. L. Barabasi, “Understanding individual human mobility patterns,†Nature, Vol. 453, No. 7196, pp. 779-782, 2008.

E. Fernandes, B. Crispo, and M. Conti, “FM 99.9, Radio virus: Exploiting FM radio broadcasts for malware deploymentâ€, Transactions on information forensics and security, Vol. 8, No. 6, June 2013.

M. Chandramohan, H. Tan, "Detection of mobile malware in the wild", IEEE early access, 2012.

Q. Yan, Y. Li, T. Li, and R. Deng, “Insights into Malware Detection and Prevention on Mobile Phonesâ€, Springer-Verlag Berlin Heidelberg 2009.

W. Enck, D. Octeau, P. Mcdaniel, S. Chaudhuri,â€A study of android application securityâ€, In: Proceedings of the 20th Usenix security symposium, August 2011.

M. Egele, T. Scholte, E. Kirda, C. Kruegel, “A Survey on Automated Dynamic Malware-Analysis Techniques and Toolsâ€, CSUR4402-06 ACM-TRANSACTION February 8, 2012.

T. Blasing, A. D. Schmidt, L. Batyuk, S. A. Camtepe, and A. Albayrak, “An android application sandbox system for suspicious software detectionâ€, In 5th International Conference on Malicious and Unwanted Software (Malware 2010), Nancy, France, 2010.

G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, “Paranoid Android: Versatile protection for smartphonesâ€, In ACSAC'10, Dec. 2010.

G. Jacoby, N. Davis, “Battery-based intrusion detectionâ€, In Proceedings of the Global Telecommunications Conference (2004).

L. Liu, G. Yan, X. Zhang, and S. Chen, “VirusMeter: Preventing your cellphone from spiesâ€, In Proceedings of RAID, volume 5758 of Lecture Notes in Computer Science, pages 244-264, 2009.

W. Enck, M. Ongtang, P. McDaniel,â€On Lightweight Mobile Phone Application Certificationâ€, In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS) (Nov 2009).


Refbacks

  • There are currently no refbacks.


ISSN: 1694-2507 (Print)

ISSN: 1694-2108 (Online)