Handsets Malware Threats and Facing Techniques

Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques and methodologies that used to face those challenges and contain the mobile handsets malwares. This paper also presents a new approach to group the different malware containment systems according to their typologies.

[1]  Xinwen Zhang,et al.  A Trusted Mobile Phone Prototype , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[2]  Felix C. Freiling,et al.  Towards Dynamic Malware Analysis to Increase Mobile Device Security423 , 2008, Sicherheit.

[3]  VenugopalDeepak,et al.  Efficient signature based malware detection on mobile devices , 2008 .

[4]  Kang G. Shin,et al.  Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.

[5]  Jean-Pierre Seifert,et al.  pBMDS: a behavior-based malware detection system for cellphone devices , 2010, WiSec '10.

[6]  Deepak Venugopal,et al.  Efficient signature based malware detection on mobile devices , 2008, Mob. Inf. Syst..

[7]  Kang G. Shin,et al.  Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.

[8]  Sahin Albayrak,et al.  Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..

[9]  Helen J. Wang,et al.  Smartphone attacks and defenses , 2004 .

[10]  Vasileios Karyotis,et al.  Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis , 2008, Journal of Computer Science and Technology.

[11]  Sencun Zhu,et al.  Designing System-Level Defenses against Cellphone Malware , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.

[12]  Songwu Lu,et al.  SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.

[13]  Helen J. Wang,et al.  Smart-Phone Attacks and Defenses , 2004 .

[14]  Qiang Yan,et al.  On the Potential of Limitation-oriented Malware Detection and Prevention Techniques on Mobile Phones , 2010 .

[15]  Nicoleta Roman,et al.  Intelligent virus detection on mobile devices , 2006, PST.

[16]  Lei Liu,et al.  VirusMeter: Preventing Your Cellphone from Spies , 2009, RAID.

[17]  Kang G. Shin,et al.  On Mobile Viruses Exploiting Messaging and Bluetooth Services , 2006, 2006 Securecomm and Workshops.

[18]  Deepak Venugopal,et al.  A Malware Signature Extraction and Detection Method Applied to Mobile Networks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.

[19]  Kang G. Shin,et al.  Propagation, Detection and Containment of Mobile Malware , 2008 .

[20]  Felix C. Freiling,et al.  Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..