Smartphone Malware and Its Propagation Modeling: A Survey

Smartphones are pervasively used in society, and have been both the target and victim of malware writers. Motivated by the significant threat that presents to legitimate users, we survey the current smartphone malware status and their propagation models. The content of this paper is presented in two parts. In the first part, we review the short history of mobile malware evolution since 2004, and then list the classes of mobile malware and their infection vectors. At the end of the first part, we enumerate the possible damage caused by smartphone malware. In the second part, we focus on smartphone malware propagation modeling. In order to understand the propagation behavior of smartphone malware, we recall generic epidemic models as a foundation for further exploration. We then extensively survey the smartphone malware propagation models. At the end of this paper, we highlight issues of the current smartphone malware propagation models and discuss possible future trends based on our understanding of this topic.

[1]  Yasir Saleem,et al.  Network Simulator NS-2 , 2015 .

[2]  P. Coulton,et al.  Mobile phone vulnerabilities: a new generation of malware , 2004, IEEE International Symposium on Consumer Electronics, 2004.

[3]  Sihan Qing,et al.  A survey and trends on Internet worms , 2005, Comput. Secur..

[4]  R. May,et al.  Infectious Diseases of Humans: Dynamics and Control , 1991, Annals of Internal Medicine.

[5]  Madhav V. Marathe,et al.  EpiNet: a simulation framework to study the spread of malware in wireless networks , 2009, SimuTools.

[6]  Geoffrey M. Voelker,et al.  Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.

[7]  Sancheng Peng,et al.  Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones , 2013, J. Comput. Syst. Sci..

[8]  Guanhua Yan,et al.  Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.

[9]  Georgios Kambourakis,et al.  iSAM: An iPhone Stealth Airborne Malware , 2011, SEC.

[10]  L. Allen An Introduction to Stochastic Epidemic Models , 2008 .

[11]  L. Allen,et al.  A comparison of three different stochastic population models with regard to persistence time. , 2003, Theoretical population biology.

[12]  Yoichi Shinoda,et al.  Modeling Malware Diffusion in Wireless Networks with Nodes' Heterogeneity and Mobility , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.

[13]  Brian L. Mark,et al.  Analysis of virus spread in wireless sensor networks: An epidemic model , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.

[14]  L. Allen,et al.  Comparison of deterministic and stochastic SIS and SIR models in discrete time. , 2000, Mathematical biosciences.

[15]  Legand L. Burge,et al.  Modelling the spread of mobile malware , 2008, Int. J. Comput. Aided Eng. Technol..

[16]  K. Abbas,et al.  MODELING INFECTIOUS DISEASES USING GLOBAL STOCHASTIC CELLULAR AUTOMATA , 2005 .

[17]  Donald F. Towsley,et al.  Code red worm propagation modeling and analysis , 2002, CCS '02.

[18]  L. Allen Some discrete-time SI, SIR, and SIS epidemic models. , 1994, Mathematical biosciences.

[19]  Binshan Lin,et al.  Security aspects of mobile phone virus: a critical survey , 2008, Ind. Manag. Data Syst..

[20]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[21]  Vasileios Karyotis,et al.  Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis , 2008, Journal of Computer Science and Technology.

[22]  Jiming Liu,et al.  Modeling and predicting the dynamics of mobile virus spread affected by human behavior , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[23]  Marko Helenius,et al.  About malicious software in smartphones , 2006, Journal in Computer Virology.

[24]  Sancheng Peng,et al.  Modeling Malware Propagation in Smartphone Social Networks , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[25]  Matthew Smith,et al.  Evaluating the threat of epidemic mobile malware , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[26]  Kang G. Shin,et al.  On Mobile Viruses Exploiting Messaging and Bluetooth Services , 2006, 2006 Securecomm and Workshops.

[27]  W. O. Kermack,et al.  A contribution to the mathematical theory of epidemics , 1927 .

[28]  Stefan Saroiu,et al.  A preliminary investigation of worm infections in a bluetooth environment , 2006, WORM '06.

[29]  Jiming Liu,et al.  Modeling and Restraining Mobile Virus Propagation , 2013, IEEE Transactions on Mobile Computing.

[30]  P. P. Chaudhuri,et al.  A Survey on Cellular Automata ∗ , 2003 .

[31]  R. Mark Wilson Using the friendship paradox to sample a social network , 2010 .

[32]  Yurong Song,et al.  Model and Dynamic Behavior of Malware Propagation over Wireless Sensor Networks , 2009, Complex.

[33]  Biplab Sikdar,et al.  Modeling Malware Propagation in Networks of Smart Cell Phones with Spatial Dynamics , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[34]  Marin Silic,et al.  Emerging security threats for mobile platforms , 2011, 2011 Proceedings of the 34th International Convention MIPRO.

[35]  Sencun Zhu,et al.  Improving sensor network immunity under worm attacks: a software diversity approach , 2008, MobiHoc '08.

[36]  W. O. Kermack,et al.  Contributions to the mathematical theory of epidemics—I , 1991, Bulletin of mathematical biology.

[37]  Maziar Nekovee,et al.  The Opportunistic Transmission of Wireless Worms between Mobile Devices , 2008, ArXiv.

[38]  John R. Birge,et al.  Introduction to Stochastic Programming , 1997 .

[39]  Fan Zhang,et al.  Stealthy video capturer: a new video-based spyware in 3G smartphones , 2009, WiSec '09.

[40]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[41]  Brian D. Noble,et al.  Modeling epidemic spreading in mobile environments , 2005, WiSe '05.

[42]  Wei Xia,et al.  Commwarrior worm propagation model for smart phone networks , 2008 .

[43]  Patrick P. C. Lee,et al.  On the detection of signaling DoS attacks on 3G/WiMax wireless networks , 2009, Comput. Networks.

[44]  YiXian Yang,et al.  Epidemic Model of Mobile Phone Virus for Hybrid Spread Mode with Preventive Immunity and Mutation , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).

[45]  Guanhua Yan,et al.  Modeling Propagation Dynamics of Bluetooth Worms , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[46]  San Cheng Peng A Survey on Malware Containment Models in Smartphones , 2012 .

[47]  Krishna P. Gummadi,et al.  Exploiting Social Interactions in Mobile Systems , 2007, UbiComp.

[48]  Maziar Nekovee,et al.  Worm epidemics in wireless ad hoc networks , 2007, ArXiv.

[49]  Guanhua Yan,et al.  Bluetooth Worms: Models, Dynamics, and Defense Implications , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[50]  Kwang-Cheng Chen,et al.  On Modeling Malware Propagation in Generalized Social Networks , 2011, IEEE Communications Letters.

[51]  Guo-Ping Jiang,et al.  Modeling malware propagation in wireless sensor networks using cellular automata , 2008, 2008 International Conference on Neural Networks and Signal Processing.

[52]  Apu Kapadia,et al.  Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.

[53]  Jeffrey O. Kephart,et al.  Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[54]  Steven Myers,et al.  Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm , 2011, LEET.

[55]  Hayder Radha,et al.  Using signal processing techniques to model worm propagation over wireless sensor networks , 2006 .

[56]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[57]  P. Kaye Infectious diseases of humans: Dynamics and control , 1993 .

[58]  Albert-László Barabási,et al.  Understanding the Spreading Patterns of Mobile Phone Viruses , 2009, Science.

[59]  Wang Suo-ping A Discrete Probabilistic Model of Malware Propagation , 2010 .

[60]  Georgios Kambourakis,et al.  User privacy and modern mobile services: are they on the same path? , 2012, Personal and Ubiquitous Computing.

[61]  J. P. Trapman,et al.  On stochastic models for the spread of infections , 2006 .

[62]  Vinod Yegneswaran,et al.  An Analysis of the iKee.B iPhone Botnet , 2010, MobiSec.

[63]  Chuanyi Ji,et al.  Spatial-temporal modeling of malware propagation in networks , 2005, IEEE Transactions on Neural Networks.

[64]  Sancheng Peng,et al.  Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[65]  Ángel Martín del Rey,et al.  Modeling epidemics using cellular automata , 2006, Applied Mathematics and Computation.

[66]  Donald F. Towsley,et al.  Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms , 2007, IEEE Transactions on Dependable and Secure Computing.

[67]  Madhav V. Marathe,et al.  High Performance Scalable and Expressive Modeling Environment to Study Mobile Malware in Large Dynamic Networks , 2011, 2011 IEEE International Parallel & Distributed Processing Symposium.

[68]  Peng Wu,et al.  General worm propagation model forwireless ad hoc networks , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[69]  W. O. Kermack,et al.  Contributions to the Mathematical Theory of Epidemics. II. The Problem of Endemicity , 1932 .

[70]  Sancheng Peng,et al.  Survivability modeling and analysis on 3D mobile ad-hoc networks , 2011 .