Power Based Malicious Code Detection Techniques for Smartphones

In recent years there have been a growing number of viruses, root kits, and malware designed to gain access to system resources and information stored on smartphones. This paper examines the effectiveness of two smartphone-specific techniques for detecting malicious code behavior based on individual power consumption profiles based on time and location. Prototypes for each of the techniques were developed for use with Google's Android platform and were each evaluated over periods of six months or more involving several real-world users. This paper describes the design and implementation of each of these prototypes as well as the evaluation of their results.

[1]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[2]  Yajin Zhou,et al.  RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.

[3]  Arati Baliga,et al.  Rootkits on smart phones: attacks, implications and opportunities , 2010, HotMobile '10.

[4]  Kang G. Shin,et al.  Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.

[5]  Jeff Yan,et al.  Breaking Visual CAPTCHAs with Naive Pattern Recognition Algorithms , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[6]  Thorsten Holz,et al.  Mobile Malware Detection Based on Energy Fingerprints - A Dead End? , 2013, RAID.

[7]  Wenyuan Xu,et al.  WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices , 2013, HealthTech.

[8]  Shivakant Mishra,et al.  Location based power analysis to detect malicious code in smartphones , 2011, SPSM '11.

[9]  Songwu Lu,et al.  SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.

[10]  Sencun Zhu,et al.  Designing System-Level Defenses against Cellphone Malware , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.

[11]  Shivakant Mishra,et al.  Time and Location Power Based Malicious Code Detection Techniques for Smartphones , 2013, 2014 IEEE 13th International Symposium on Network Computing and Applications.

[12]  Lei Liu,et al.  VirusMeter: Preventing Your Cellphone from Spies , 2009, RAID.

[13]  Matthew M. Williamson,et al.  Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[14]  Kang G. Shin,et al.  Propagation, Detection and Containment of Mobile Malware , 2008 .

[15]  Apu Kapadia,et al.  Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.

[16]  Bryan Dixon,et al.  Exploring Low Profile Techniques for Malicious Code Detection on Smartphones , 2013 .

[17]  Wenyuan Xu,et al.  Current Events: Identifying Webpages by Tapping the Electrical Outlet , 2013, ESORICS.