A Mobile Phone Malicious Software Detection Model with Behavior Checker
There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented.
KeywordsMobile Phone Computer Virus Malicious Attack Malicious Activity Integrity Checker
Unable to display preview. Download preview PDF.
- 1.Davis, R.: Exploring computer viruses. In: Fourth Aerospace Computer Security Applications Conference, December 12-16, pp. 7–11 (1988)Google Scholar
- 3.Jamaluddin, J., Zotou, N., Coulton, P.: Mobile phone vulnerabilities: a new generation of malware. In: 2004 IEEE International Symposium On Consumer Electronics, September 1-3, pp. 199–202 (2004)Google Scholar
- 4.Dagon, D., Martin, T., Starner, T.: Mobile Phones as Computing Devices: The Viruses are Coming!, Pervasive Computing. IEEE 3(4), 11–15 (2004)Google Scholar
- 6.eFinland. Preparing for Mobile Phone Viruses [Online] (November 1, 2004), Available: http://www.e.finland.fi/netcomm/news/showarticle.asp?intNWSAID=29431
- 7.BluejackQ (No Date). What is Bluejacking [Online]. Available: http://www.bluejackq.com/what-is-bluejacking.shtml
- 8.BBC News World Edition. Mobile Virus Threat Looms Large [Online] Available: http://news.bbc.co.uk/2/hi/technology/2690253.stm
- 9.Belson, K.: A Brand New Worry: Mobile Phone Viruses, International Herald Tribune: The IHT Online Available: http://www.iht.com/cgibin/generic.cgi?template=articleprint.tmplh&ArticleID=119373
- 10.Ludwig, M.A.: Black Book of Computer Viruses. American Eagle Publication, Inc. (1995)Google Scholar
- 11.Ellen, M.: Behavior blocking repels new viruses [Online] (February 1, 2002), Available: http://www.nwfusion.com/news/2002/0128antivirus.html
- 13.Teng, H., Chen, K., Lu, S.: Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns. In: Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pp. 278–284 (May 1990)Google Scholar