An Opened Eye on you

As personal communication platforms, third-generation (3G) smartphones have become increasingly pervasive in recent years. Unfortunately, they contain more personal and confidential information and are easily compromised. Particularly, we design and implement stealthy video capturer (SVC), a new video-based spyware, on real 3G smartphones. The SVC can steal private information of users by secretly recording and transmitting videos to a third party. We present two practical applications of SVC, i.e., mobile forensics and child care. We anticipate that this article will draw extensive attention to the readers of this issue.

[1]  Fan Zhang,et al.  Stealthy video capturer: a new video-based spyware in 3G smartphones , 2009, WiSec '09.

[2]  Michael W. Hicks,et al.  Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.

[3]  Sang-Bum Suh,et al.  Xen on ARM: System Virtualization Using Xen Hypervisor for ARM-Based Secure Mobile Phones , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[4]  George Lawton Is It Finally Time to Worry about Mobile Malware? , 2008, Computer.

[5]  William A. Arbaugh,et al.  Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.

[6]  TuchHarvey,et al.  The VMware mobile virtualization platform , 2010 .

[7]  Patrick D. McDaniel,et al.  Understanding Android Security , 2009, IEEE Security & Privacy Magazine.

[8]  Xiaoxin Chen,et al.  Automated containment of rootkits attacks , 2008, Comput. Secur..

[9]  M. Piercy Embedded devices next on the virus target list , 2004 .

[10]  Mikko Hypponen,et al.  Malware goes mobile. , 2006, Scientific American.

[11]  Tom Martin,et al.  Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.

[12]  Arati Baliga,et al.  Automatic Inference and Enforcement of Kernel Data Structure Invariants , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).

[13]  Arati Baliga,et al.  Rootkits on smart phones: attacks, implications and opportunities , 2010, HotMobile '10.

[14]  Wayne Jansen,et al.  Guidelines on Cell Phone Forensics , 2007 .