A Survey on Malware Containment Models in Smartphones

Article Preview

Abstract:

Smartphones providing services like SMS/MMS, emails, online banking, and other applications, are becoming an integral part of our everyday lives. However, the availability of these services and applications provided by smartphones makes them a target for malicious attackers to propagate malware and perform other malicious attacks. To restrain malware propagation, the research advancement of malware containment is summarized in this paper. We provide an overview on malware, which includes the evolution of mobile malware, related concept, infection vectors, and risks. The typical malware containment models are selected to discuss in detail. At last, the current problems and challenges in this field for future work are proposed. This paper indicates that diversity and complexity of mobile malware pose great challenges in modeling malware containment.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3005-3011

Citation:

Online since:

December 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] J. Jamaluddin, N. Zotou, and P. Coulton, in: Proceedings of the IEEE International Symposium on Consumer Electronics, pp.199-202, 2004.

Google Scholar

[2] Information on http://www.informationweek.com/news/security/attacks/228200648.

Google Scholar

[3] Information on http://www.cellular-news.com/story/54544.php.

Google Scholar

[4] Information on http://www.juniper.net/us/en/local/pdf/additional-resources/jnpr-2011-mobile- threats-report.pdf.

Google Scholar

[5] Information on http://www.f-secure.com/en/web/labs_global/2004-threat-summary.

Google Scholar

[6] Information on http://www.securelist.com/en/analysis?pubid=201225789.

Google Scholar

[7] Information on http://www.securelist.com/en/analysis?pubid=200119916.

Google Scholar

[8] D. Shih, B. Lin, H. Chiang, and M. Shih, Industrial Management & Data Systems, Vol. 108, No. 4, pp.478-494, 2008.

DOI: 10.1108/02635570810868344

Google Scholar

[9] M. Hypponen, "Mobile Security Review September 2010," F-Secure Labs, HelsinkiFinland, Technical Report, September 2010.

Google Scholar

[10] A. D. Schmidt and S. Albayrak, "Malicious Software for Smartphones," Technische Universit¨at Berlin - DAI-Labor, Tech. Rep. TUBDAI 02/08-01, February 2008, http://www.dai-labor.de.

Google Scholar

[11] M. L. Polla, F. Martinelli, and D. Sgandurra, Accepted by IEEE Communications Survey & Tutorials, 2012.

Google Scholar

[12] Information on http://www.securelist.com/en/analysis/204792100/Kaspersky_Security_ Bulletin_2009_Malware_Evolution_2009.

Google Scholar

[13] Information on http://www.securelist.com/en/analysis/204792217/Kaspersky_Security_ Bulletin_Malware_Evolution_2011.

Google Scholar

[14] Information on http://www.informationweek.com/news/mobility/security/232601868.

Google Scholar

[15] Information on http://techministries. org/downloads/Malware.pdf.

Google Scholar

[16] S. Peng and G. Wang, in: Proceeding of IEEE TrustCom, Changsha, China, pp.282-287, November 2011.

Google Scholar

[17] S. Peng, G. Wang, and S. Yu, Accepted by Elsevier's Journal of Computer and System Sciences, 2012.

Google Scholar

[18] A. Bose and K. G. Shin, In: Proceeding of ACM WiSe, Los Angeles, California, USA, pp.95-104, September 2006.

Google Scholar

[19] L. Xie, H. Song, T. Jaeger, and S. Zhu, in: Proceeding of WWW, 1083-1084, April 2008.

Google Scholar

[20] L. Xie, X. Zhang, A. Chaugule, T. Jaeger, and S. Zhu. In: Proceeding of IEEE SRDS, New York, USA, pp.83-90, 2009.

Google Scholar

[21] G. Zyba, G. M. Voelker, M. Liljenstam, A. M´ehes, and P. Johansson, in: Proceedings of IEEE INFOCOM, Rio de Janeiro, Brazil, pp.1503-1511, April 2009.

Google Scholar

[22] Z. Zhu, G. Cao, S. Zhu, S. Ranjany, and A. Nucciy, in: Proceedings of IEEE INFOCOM, Rio de Janeiro, Brazil, pp.1476-1484, April 2009.

Google Scholar

[23] F. Li, Y. Yang, and J. Wu, in: Proceedings of the 29th IEEE Conference on Computer Communications, San Diego, CA, USA, pp.1-9, March 2010.

Google Scholar

[24] Y. Li, P. Hui, D. Jin, L. Su, and L. Zeng, in: Proceedings of IEEE SECON, Salt Lake City, USA, pp.314-322, June 2011.

Google Scholar

[25] J. Tang, C. Mascolo, M. Musolesi, and V. Latora, in: Proceedings of IEEE WoWMoM, Lucca, Italy, June 2011.

Google Scholar

[26] J. Tang, H. Kim, C. Mascolo, and M. Musolesi, in: Proceedings of IEEE WoWMoM, San Francisco, USA, June 2012.

Google Scholar

[27] C. Gao and J. Liu, accepted by IEEE Transactions on Mobile Computing, Digital Object Identifier: 10.1109/TMC.2012.29, 2012.

Google Scholar

[28] C. Gao, J. Liu, and N. Zhong, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 7, pp.1222-1229, 2011.

Google Scholar