Advertisement

Method of Smartphone Users’ Information Protection Based on Composite Behavior Monitor

  • Hua Zha
  • Chunlin Peng
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7389)

Abstract

For the users’ information of the Smartphone disclosure issues, a method of users’ information secure for the Smartphone has been researched. Based on hidden Markov model and fuzzy pattern recognition model, the paper proposes a compound monitoring approach which use the heuristic scanning-behavior block monitoring, to discriminate the behavior of the program whether is malicious. Finally, the paper introduces a method for testing Smartphone users’ information protection. The results show that this method is able to well implement to monitor and block the malicious behavior of the program.

Keywords

heuristic scanning behavior blocking malicious behavior Smartphones Information Protection 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Statistical report of the global mobile phone (OL) (2012), http://www.199it.com/archives/23609.html
  2. 2.
    Cheng, Z.: Mobile Malware: Threats and Prevention, McAfee Avert Labs (2008)Google Scholar
  3. 3.
    Yap, T.S., Ewe, H.T.: A Mobile Phone Malicious Software Detection Model with Behavior Checker. In: Proc. of HIS 2005, pp. 57–65 (2005)Google Scholar
  4. 4.
    Szor, P.: The Art of Computer Virus Research and Defense. Addison Wesley Professional (2005)Google Scholar
  5. 5.
    Wang, Z.H., Wang, H.F.: Study on Anti-Virus Engine Based on Heuristic Search of Polymorphic Virus Behavior. Research and Exploration in Laboratory 25(9), 1089–1091 (2006)Google Scholar
  6. 6.
    Wu, J.J., Fang, M.W., Zhang, X.F.: Research of Mobile Phone Virus Defense Based on Heuristic Behavior-Checking. Computer Engineering and Science 32(1), 35–38 (2010)Google Scholar
  7. 7.
    Cui, P.: Application of Formal Semantics to Heuristic Anti-virus Engine. Journal of Liaodong University (Natural Sciences) 15(3), 167–171 (2008)Google Scholar
  8. 8.
    Hu, Y.T., Chen, G., Zheng, N., Guo, Y.H.: Malicious Executable Detection Based on Run-time Behavior. Computer Engineering and Applications 45(17), 64–66 (2009)Google Scholar
  9. 9.
    Zhang, B.Y., Yin, J.P., Tang, W.S.: Study and Implementation Intelligent Detection System to Recognize Unknown Computer Virus. Computer Engineering and Design 27(11), 1936–1938 (2006)Google Scholar
  10. 10.
    Liu, X.L., Liu, K.: Principle of Malware Analysis and Study of Protective Measures on Windows Mobile Phone. Network Security Technology & Application 9, 41–43 (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Hua Zha
    • 1
  • Chunlin Peng
    • 1
  1. 1.Research Institute of Electronic Science and TechnologyUniversity of Electronic Science and Technology of ChinaChengduP.R.China

Personalised recommendations