Security aspects of mobile phone virus: a critical survey

Purpose – The paper's aim is to provide information about mobile viruses for end‐users or organizations and recommend useful tips of how individuals can protect their mobile phones from the intrusion of mobile phone viruses.Design/methodology/approach – This paper surveys chronicle, securities, risks and countermeasure of mobile phone viruses.Findings – This paper investigates infection routes, threats, damage, and spreading ways of mobile phone viruses and provides available countermeasures. It also provides useful tips about mobile viruses, indicating what to do and how to do it.Research limitations/implications – This research may not be exhaustive about mobile viruses.Practical implications – A very useful source of information and impartial advice for end‐users or organizations who are planning to protect their mobile phones and their own privacy.Originality/value – This paper is the first to survey the risk of mobile phones and it discusses how organizations or individuals can protect mobile phones ...

[1]  Denis Zenkin Fighting Against the Invisible Enemy - Methods for detecting an unknown virus , 2001, Comput. Secur..

[2]  Marko Helenius,et al.  About malicious software in smartphones , 2006, Journal in Computer Virology.

[3]  Young B. Choi,et al.  The pricing of wireless phone services in the USA: issues and development trends , 2007, Int. J. Mob. Commun..

[4]  Binshan Lin,et al.  Identity theft in the USA: evidence from 2002 to 2006 , 2008, Int. J. Mob. Commun..

[5]  Jiaqin Yang,et al.  Social reference group influence on mobile phone purchasing behaviour: a cross-nation comparative study , 2007, Int. J. Mob. Commun..

[6]  C.J. Harris,et al.  The application of CMAC based intelligent agents in the detection of previously unseen computer viruses , 1999, Proceedings 1999 International Conference on Information Intelligence and Systems (Cat. No.PR00446).

[7]  Mark Howell,et al.  User characteristics and performance with automated mobile phone systems , 2008, Int. J. Mob. Commun..

[8]  Alan D. Smith,et al.  Establishing standards for wireless security in a security-conscious world , 2007, Int. J. Serv. Stand..

[9]  Hong Tat Ewe,et al.  A Mobile Phone Malicious Software Detection Model with Behavior Checker , 2005, Human.Society@Internet.

[10]  Tom Martin,et al.  Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.

[11]  David C. Yen,et al.  Classification methods in the detection of new malicious emails , 2005, Inf. Sci..

[12]  Jieh Hsiang,et al.  A generic virus detection agent on the Internet , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[13]  Hsiu-Sen Chiang,et al.  E-mail viruses: how organizations can protect their e-mails , 2004, Online Inf. Rev..

[14]  Mikko Hypponen,et al.  Malware goes mobile. , 2006, Scientific American.

[15]  Brian D. Noble,et al.  Modeling epidemic spreading in mobile environments , 2005, WiSe '05.

[16]  Gerald Tesauro,et al.  Neural networks for computer virus recognition , 1996 .

[17]  Gary E. Gorman,et al.  Internet use in South Korea , 2002, Online Inf. Rev..

[18]  Peter J. Clarke,et al.  Testing and evaluating virus detectors for handheld devices , 2006, Journal in Computer Virology.

[19]  Dong Li,et al.  An Epidemic Model of Mobile Phone Virus , 2006, 2006 First International Symposium on Pervasive Computing and Applications.