SmartSiren

作者: Jerry Cheng , Starsky H.Y. Wong , Hao Yang , Songwu Lu

DOI: 10.1145/1247660.1247690

关键词:

摘要: Smartphones have recently become increasingly popular because they provide "all-in-one" convenience by integrating traditional mobile phones with handheld computing devices. However, the flexibility of running third-party softwares also leaves smartphones open to malicious viruses. In fact, hundreds smartphone viruses emerged in past two years, which can quickly spread through various means such as SMS/MMS, Bluetooth and IP-based applications. Our own implementations proof-of-concept on Windows Mobile confirmed vulnerability this platform.In paper, we present SmartSiren, a collaborative virusdetection alert system for smartphones. order detect viruses, SmartSiren collects communication activity information from smartphones, performs joint analysis both single-device system-wide abnormal behaviors. We use proxy-based architecture offload processing burden resource-constrained simplify collaboration among When potential virus is detected, proxy quarantines out-break sending targeted alerts those immediately threatened demonstrated feasibility Dopod 577w smartphone, evaluated its effectiveness using simulations driven 3-week SMS traces national cellular carrier. results show that effectively prevent wide-area outbreaks affordable overhead.

参考文章(17)
Brad Karp, Hyang-Ah Kim, Autograph: toward automated, distributed worm signature detection usenix security symposium. pp. 19- 19 ,(2004)
Celeste Biever, Phone viruses: how bad is it? New Scientist. pp. 25- 26 ,(2005)
Wenwu Zhu, Helen J. Wang, Chuanxiong Guo, Smart-Phone Attacks and Defenses ,(2004)
Patrick Traynor, William Enck, Patrick McDaniel, Thomas La Porta, Exploiting open functionality in SMS-capable cellular networks Journal of Computer Security. ,vol. 16, pp. 713- 742 ,(2008) , 10.3233/JCS-2007-0308
Cristian Estan, George Varghese, Stefan Savage, Sumeet Singh, Automated worm fingerprinting operating systems design and implementation. pp. 4- 4 ,(2004)
S. Pohlig, M. Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) IEEE Transactions on Information Theory. ,vol. 24, pp. 106- 110 ,(1978) , 10.1109/TIT.1978.1055817
Abhijit Bose, Kang G. Shin, On Mobile Viruses Exploiting Messaging and Bluetooth Services 2006 Securecomm and Workshops. pp. 1- 10 ,(2006) , 10.1109/SECCOMW.2006.359562
Radmilo Racic, Denys Ma, Hao Chen, Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery 2006 Securecomm and Workshops. pp. 1- 10 ,(2006) , 10.1109/SECCOMW.2006.359550
Christian Kreibich, Jon Crowcroft, Honeycomb: creating intrusion detection signatures using honeypots acm special interest group on data communication. ,vol. 34, pp. 51- 56 ,(2004) , 10.1145/972374.972384
James W. Mickens, Brian D. Noble, Modeling epidemic spreading in mobile environments Proceedings of the 4th ACM workshop on Wireless security - WiSe '05. pp. 77- 86 ,(2005) , 10.1145/1080793.1080806