Smartphone security evaluation The malware attack case

作者: Stelios Dritsas , Dimitris Gritzalis , Alexios Mylonas , Bill Tsoumas

DOI:

关键词:

摘要: The adoption of smartphones, devices transforming from simple communication to ‘smart’ and multipurpose devices, is constantly increasing. Amongst the main reasons are their small size, enhanced functionality ability host many useful attractive applications. However, this vast use mobile platforms makes them an target for conducting privacy security attacks. This scenario increases risk introduced by these attacks personal given that smartphones as business tools may extend perimeter organization's IT infrastructure. Furthermore, smartphone provide application developers with rich capabilities, which can be used compromise device holder her environment (private and/or organizational). paper examines feasibility malware development in average programmers have access official programming libraries provided platforms. Towards direction we initially propose specific evaluation criteria assessing level well-known (i.e. Android, BlackBerry, Apple iOS, Symbian, Windows Mobile), terms malware. In sequel, a comparative analysis, based on proof concept study, implementation distribution location tracking attempted. Our study has proven that, under circumstances, all could attack vectors, harvesting data without users knowledge consent.

参考文章(7)
Mikko Hypponen, Malware Goes Mobile Scientific American. ,vol. 295, pp. 70- 77 ,(2006) , 10.1038/SCIENTIFICAMERICAN1106-70
Fred Cohen, Computational aspects of computer viruses Computers & Security. ,vol. 8, pp. 297- 298 ,(1989) , 10.1016/0167-4048(89)90089-8
Marianthi Theoharidou, Dimitra Xidara, Dimitris Gritzalis, A CBK for Information Security and Critical Information and Communication Infrastructure Protection International Journal of Critical Infrastructure Protection. ,vol. 1, pp. 81- 96 ,(2008) , 10.1016/J.IJCIP.2008.08.007
J.O. Kephart, S.R. White, Directed-graph epidemiological models of computer viruses ieee symposium on security and privacy. pp. 343- 359 ,(1991) , 10.1109/RISP.1991.130801
M. Weiser, The Computer for the 21st Century Scientific American. ,vol. 265, pp. 94- 104 ,(1991) , 10.1038/SCIENTIFICAMERICAN0991-94
R. Hulsebosch, C. Güinther, G. Horn, S. Holtmanns, K. Howker, K. Paterson, J. Claessens, M. Schuba, Pioneering advanced mobile privacy and security IET Digital Library. pp. 383- 432 ,(2004) , 10.1049/PBTE051E_CH17
Leonard M. Adleman, An abstract theory of computer viruses Rogue programs: viruses, worms and Trojan horses. pp. 307- 323 ,(1990)