A Survey on mobile malware: War without end

These days’ mobile devices are an inseparable part of our everyday lives and in preceding years its usage has grown-up exponentially. With the functionality upgrade of mobile phones, the malware threat for mobile phones is expected to increase. This threat got worse with the fast internet access which provides attractive targets for malware developers. The growth of smart phone usage can also be directly linked to its capability to support third-party applications that are offered through online application markets. Therefore, smart phones now represent a supreme objective for malware writers. Evolution, propagation, detection & control of mobile malware are to be explored.

[1]  Ning Zhong,et al.  Network immunization and virus propagation in email networks: experimental evaluation and analysis , 2010, Knowledge and Information Systems.

[2]  Grant A. Jacoby,et al.  Battery-based intrusion detection , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[3]  Mauro Conti,et al.  FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment , 2013, IEEE Transactions on Information Forensics and Security.

[4]  Herbert Bos,et al.  Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.

[5]  Christopher Krügel,et al.  A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.

[6]  Hee Beng Kuan Tan,et al.  Detection of Mobile Malware in the Wild , 2012, Computer.

[7]  Albert-László Barabási,et al.  Understanding individual human mobility patterns , 2008, Nature.

[8]  Lei Liu,et al.  VirusMeter: Preventing Your Cellphone from Spies , 2009, RAID.

[9]  Swarat Chaudhuri,et al.  A Study of Android Application Security , 2011, USENIX Security Symposium.

[10]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[11]  Guanhua Yan,et al.  Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.

[12]  Patrick D. McDaniel,et al.  On lightweight mobile phone application certification , 2009, CCS.

[13]  Jiming Liu,et al.  Modeling and Restraining Mobile Virus Propagation , 2013, IEEE Transactions on Mobile Computing.

[14]  Robert H. Deng,et al.  Insights into Malware Detection and Prevention on Mobile Phones , 2009, FGIT-SecTech.

[15]  Sahin Albayrak,et al.  An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.