A Mobile Phone Malicious Software Detection Model with Behavior Checker

  • Teck Sung Yap
  • Hong Tat Ewe
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3597)


There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented.


Mobile Phone Computer Virus Malicious Attack Malicious Activity Integrity Checker 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Davis, R.: Exploring computer viruses. In: Fourth Aerospace Computer Security Applications Conference, December 12-16, pp. 7–11 (1988)Google Scholar
  2. 2.
    Slade, R.: Guide to computer viruses, 2nd edn. Springer, New York (1996)zbMATHGoogle Scholar
  3. 3.
    Jamaluddin, J., Zotou, N., Coulton, P.: Mobile phone vulnerabilities: a new generation of malware. In: 2004 IEEE International Symposium On Consumer Electronics, September 1-3, pp. 199–202 (2004)Google Scholar
  4. 4.
    Dagon, D., Martin, T., Starner, T.: Mobile Phones as Computing Devices: The Viruses are Coming!, Pervasive Computing. IEEE 3(4), 11–15 (2004)Google Scholar
  5. 5.
    Gupta, V., Gupta, S.: Securing the wireless internet. IEEE Communication Magazine 39(12), 68–74 (2001)CrossRefGoogle Scholar
  6. 6.
    eFinland. Preparing for Mobile Phone Viruses [Online] (November 1, 2004), Available:
  7. 7.
    BluejackQ (No Date). What is Bluejacking [Online]. Available:
  8. 8.
    BBC News World Edition. Mobile Virus Threat Looms Large [Online] Available:
  9. 9.
    Belson, K.: A Brand New Worry: Mobile Phone Viruses, International Herald Tribune: The IHT Online Available:
  10. 10.
    Ludwig, M.A.: Black Book of Computer Viruses. American Eagle Publication, Inc. (1995)Google Scholar
  11. 11.
    Ellen, M.: Behavior blocking repels new viruses [Online] (February 1, 2002), Available:
  12. 12.
    Denning, D.: An Intrusion-Detection Model. IEEE Transactions on Software Engineering 13(2), 222–232 (1987)CrossRefGoogle Scholar
  13. 13.
    Teng, H., Chen, K., Lu, S.: Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns. In: Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pp. 278–284 (May 1990)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Teck Sung Yap
    • 1
  • Hong Tat Ewe
    • 1
  1. 1.Faculty of Information TechnologyMultimedia UniversityMalaysia

Personalised recommendations