Efficient signature based malware detection on mobile devices

作者: Deepak Venugopal , Guoning Hu

DOI: 10.1155/2008/712353

关键词:

摘要: The threat of malware on mobile devices is gaining attention recently. It important to provide security solutions these before threats cause widespread damage. However, have severe resource constraints in terms memory and power. Hence, even though there are well developed techniques for detection the PC domain, it requires considerable effort adapt devices. In this paper, we outline considerations propose a signature based method. Specifically, detail matching algorithm that suited use device scanning due its low requirements. Additionally, shown high speed which makes unobtrusive users. Our evaluation comparison study with known Clam-AV scanner shows our solution consumes less than 50% used by while maintaining fast rate.

参考文章(33)
Mike Fisk, George Varghese, Fast Content-Based Packet Handling for Intrusion Detection University of California at San Diego. ,(2001) , 10.21236/ADA406413
Yongguang Zhang, Wenke Lee, Yi-An Huang, Intrusion detection techniques for mobile wireless networks Wireless Networks. ,vol. 9, pp. 545- 556 ,(2003) , 10.1023/A:1024600519144
Fang Yu, R.H. Katz, T.V. Lakshman, Gigabit rate packet pattern-matching using TCAM international conference on network protocols. pp. 174- 183 ,(2004) , 10.1109/ICNP.2004.1348108
Erez Zadok, Charles P. Wright, Yevgeniy Miretskiy, Abhijith Das, Avfs: an on-access anti-virus file system usenix security symposium. pp. 6- 6 ,(2004)
Jeffrey Kephart, Gregory Sorkin, Morton Swimmer, Steve White, Blueprint for a Computer Immune System Proceedings of the 1997 International Virus Bulletin Conference, San Francisco, California, October, 1997. pp. 242- 261 ,(1999) , 10.1007/978-3-642-59901-9_13
Beate Commentz-Walter, A String Matching Algorithm Fast on the Average international colloquium on automata, languages and programming. pp. 118- 132 ,(1979) , 10.1007/3-540-09510-1_10
M. Attig, S. Dharmapurikar, J. Lockwood, Implementation results of bloom filters for string matching field-programmable custom computing machines. pp. 322- 323 ,(2004) , 10.1109/FCCM.2004.41
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)