Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices 2011
DOI: 10.1145/2046614.2046618
|View full text |Cite
|
Sign up to set email alerts
|

A survey of mobile malware in the wild

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
327
1
5

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 617 publications
(353 citation statements)
references
References 9 publications
1
327
1
5
Order By: Relevance
“…Phishing is a difficult unresolved problem [8]. Since phishing attacks can be made more convincing on smartphones than on a desktop browser, users can expect to see more phishing attacks on mobile malware in the future [8].…”
Section: Smartphone Vulnerabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Phishing is a difficult unresolved problem [8]. Since phishing attacks can be made more convincing on smartphones than on a desktop browser, users can expect to see more phishing attacks on mobile malware in the future [8].…”
Section: Smartphone Vulnerabilitymentioning
confidence: 99%
“…Since phishing attacks can be made more convincing on smartphones than on a desktop browser, users can expect to see more phishing attacks on mobile malware in the future [8]. Attackers create different kinds of malware to exploit devices for financial gain, utilization of resources, information and data theft, search engine optimization, spam messages, access private networks, or even damaging devices for amusement.…”
Section: Smartphone Vulnerabilitymentioning
confidence: 99%
“…Egele et al [34] studied privacy threats affecting iOS users whereas TaintDroid [35] used a system wide taint tracking to identify privacy leaks in Android applications. Some studies have surveyed the types of mobile malware seen in the wild, and evaluated different techniques that can be leveraged in detecting and preventing such threats [36,37,38].…”
Section: Related Workmentioning
confidence: 99%
“…This Trojan buys items from online stores and intercepts the SMS messages containing a verification code that is needed to complete the payment process. Additionally, further mobile malware, which steals authentication credentials, attacks mobile phone owners [22,27].…”
Section: Mobile Phone Trojansmentioning
confidence: 99%
“…Several studies conducted on mobile malware [22,27] show that authentication credential stealing mobile malware exists in the wild. In this work, we present countermeasures that specifically protect against mobile malware that is built to intercept and exfiltrate authentication credentials sent via SMS.…”
Section: Related Workmentioning
confidence: 99%