Rootkits on smart phones: attacks, implications and opportunities

作者: Jeffrey Bickford , Ryan O'Hare , Arati Baliga , Vinod Ganapathy , Liviu Iftode

DOI: 10.1145/1734583.1734596

关键词:

摘要: Smart phones are increasingly being equipped with operating systems that compare in complexity those on desktop computers. This trend makes smart phone vulnerable to many of the same threats as systems.In this paper, we focus threat posed by rootkits. Rootkits malware stealthily modify system code and data achieve malicious goals, have long been a problem for desktops. We use three example rootkits show just systems. However, ubiquity unique interfaces they expose, such voice, GPS battery, make social consequences particularly devastating. conclude paper identifying challenges need be addressed effectively detect phones.

参考文章(13)
William A. Arbaugh, Timothy Fraser, Nick L. Petroni, Jesus Molina, Copilot - a coprocessor-based kernel runtime integrity monitor usenix security symposium. pp. 13- 13 ,(2004)
Reiner Sailer, Leendert van Doorn, Trent Jaeger, Xiaolan Zhang, Design and implementation of a TCG-based integrity measurement architecture usenix security symposium. pp. 16- 16 ,(2004)
Tal Garfinkel, Mendel Rosenblum, A Virtual Machine Introspection Based Architecture for Intrusion Detection. network and distributed system security symposium. ,(2003)
Radmilo Racic, Denys Ma, Hao Chen, Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery 2006 Securecomm and Workshops. pp. 1- 10 ,(2006) , 10.1109/SECCOMW.2006.359550
Arati Baliga, Liviu Iftode, Xiaoxin Chen, Automated containment of rootkits attacks Computers & Security. ,vol. 27, pp. 323- 334 ,(2008) , 10.1016/J.COSE.2008.06.003
Xiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ronald Perez, Reiner Sailer, Secure coprocessor-based intrusion detection Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC - EW10. pp. 239- 242 ,(2002) , 10.1145/1133373.1133423
William Enck, Patrick Traynor, Patrick McDaniel, Thomas La Porta, Exploiting open functionality in SMS-capable cellular networks Proceedings of the 12th ACM conference on Computer and communications security - CCS '05. pp. 393- 404 ,(2005) , 10.1145/1102120.1102171
Joo-Young Hwang, Sang-Bum Suh, Sung-Kwan Heo, Chan-Ju Park, Jae-Min Ryu, Seong-Yeol Park, Chul-Ryun Kim, Xen on ARM: System Virtualization Using Xen Hypervisor for ARM-Based Secure Mobile Phones consumer communications and networking conference. pp. 257- 261 ,(2008) , 10.1109/CCNC08.2007.64
Nick L. Petroni, Michael Hicks, Automated detection of persistent kernel control-flow attacks computer and communications security. pp. 103- 115 ,(2007) , 10.1145/1315245.1315260
Arati Baliga, Vinod Ganapathy, Liviu Iftode, Automatic Inference and Enforcement of Kernel Data Structure Invariants annual computer security applications conference. pp. 77- 86 ,(2008) , 10.1109/ACSAC.2008.29