Skip to main content

Event-Based Method for Detecting Trojan Horses in Mobile Devices

  • Conference paper
Security and Privacy in Mobile Information and Communication Systems (MobiSec 2010)

Abstract

Mobile phones and wireless technology and its constant evolution have, in the last years, revolutionized the way in which we communicate and work. However, one of the main barriers encounter in the use of these technologies is data security. Trojan horses are dangerous software to attack phones, PDAs and Smartphones. New versions are created everyday to attack the functionality, theft the stored information and propagate themselves. In this paper, we present a new real-time method to detect Trojan horses in mobile devices. We study the events in the device to detect programs which can be suspected to be Trojan horses. By doing so, we can detect not only the known Trojan horses with more accuracy, but also detect new trojans. Practical experiences on different devices have been carried out and results show the effectiveness of the method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A-Squared Anti-Trojan Software, http://www.anti.trojan.net/en/

  2. Crapanzano, J.: Deconstructing SubSeven, the Trojan horse of choice, http://www.sans.org/rr/toppapers/subseven.php

  3. Urra, O., Ilarri, S., Mena, E.: Testing Mobile Agent Platforms Over the Air. In: Proceedings of ICDE Workshop (2008)

    Google Scholar 

  4. Naghsh, A.R., Nilchi, A.R.: Evaluation of Security and Fault Tolerance in Mobile Agents. In: Wireless and Optical Communications Networks (2008)

    Google Scholar 

  5. Loebbecke, C., Huyskens, C.: Adoption of Mobile TV Services Among Early Users: Convergence of Familiar Technologies and Emergence of Technology Induced Paradoxes. In: 7th International Conference on Mobile Business (2008)

    Google Scholar 

  6. Schatz, R., Egger, S.: Social Interaction Features for Mobile TV Services. In: Proceedings of ITI Conference (2007)

    Google Scholar 

  7. Zhang, Q.: Mobile Payment in Mobile E-commerce. In: Proceedings of the 7th World Congress on Intelligent Control and Automation (2008)

    Google Scholar 

  8. Carlsson, C., Walden, P., Yang, F.: Travel MoCo - A Mobile Community Service for Tourists. In: 7th International Conference on Mobile Business (2008)

    Google Scholar 

  9. Moura, M.: Mobile learning: teaching and learning with mobile phones and Podcasts. In: 8th IEEE International Conference on Advanced Learning Technologies (2008)

    Google Scholar 

  10. Lauri, A.: Bluetooth and WAP push based location aware mobile advertising system. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (2004)

    Google Scholar 

  11. Salo, J., Tähtinen, J.: Retailer Use of Permission-Based Mobile Advertising. In: Proceedings of Advances in Elec-tronic Marketing. Idea Publishing Group, USA (2005)

    Google Scholar 

  12. Sandu, F., Romanca, M.: Remote and Mobile Control in Domotics. In: Proceedings of Optimization of Electrical and Electronic Equipment (2008)

    Google Scholar 

  13. Fernández-Montes González, A., Álvarez García, J.A., Juan Antonio Ortega Ramirez J.A., Martínez N., Seepold R.: An Orientation Service for Dependent People Based on an Open Service Architecture. In: Lecture Notes in Computer Science. Springer, Heidelberg (2007)

    Google Scholar 

  14. http://www.flexibilis.com

  15. http://www.airscanner.com

  16. Xie, L., Zhang, X., Chaugule, A., Jaeger, T., Zhu, S.: Designing System-level Defenses against Cellphone Malware. In: Proceedings of 28th IEEE International Symposium on Reliable Distributed Systems (2009)

    Google Scholar 

  17. RedFiveLabs, http://www.redfivelabs.com

  18. Neo-Call, http://www.neo-call.com

  19. Cabir code, http://www.offensivecomputing.net/?q=node/773

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Fuentes, D., Álvarez, J.A., Ortega, J.A., González-Abril, L., Velasco, F. (2010). Event-Based Method for Detecting Trojan Horses in Mobile Devices. In: Schmidt, A.U., Russello, G., Lioy, A., Prasad, N.R., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 47. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17502-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17502-2_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17501-5

  • Online ISBN: 978-3-642-17502-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics