Ieee Infocom 2009 2009
DOI: 10.1109/infcom.2009.5062067
|View full text |Cite
|
Sign up to set email alerts
|

Defending Mobile Phones from Proximity Malware

Abstract: Abstract-As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable challenges to malware detection and mitigation. Unlike malware that propagates using the network, where the provider can employ centralized defenses, proximity malware can propagate in an entirely distributed fashion. In this paper we consider the dynamics of mobile phone malware that propagates by proximity contact, and we evalua… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
36
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(37 citation statements)
references
References 13 publications
0
36
0
Order By: Relevance
“…State-of-the-art solutions on mobile malware containment have ignored two important temporal properties: firstly, the time order, frequency and duration of contacts; and secondly, the time of day a malicious message starts to spread and the delay of a patch [26], [27]. Instead, we argue that the temporal dimension is of key importance in devising effective solutions to this problem.…”
mentioning
confidence: 89%
See 1 more Smart Citation
“…State-of-the-art solutions on mobile malware containment have ignored two important temporal properties: firstly, the time order, frequency and duration of contacts; and secondly, the time of day a malicious message starts to spread and the delay of a patch [26], [27]. Instead, we argue that the temporal dimension is of key importance in devising effective solutions to this problem.…”
mentioning
confidence: 89%
“…However, this only captures potentially long-distance relationships and misses important opportunistic contacts that Bluetooth worms can exploit. In [27] Zyba et al evaluate the spreading of a patch via short-range radio transmission; this work is based on a random mobility model and assumes homogeneous mixing and degree distribution over time. As we have shown, mobile phone contact networks are driven by periodic human schedules and so the models proposed in this paper could be considered as an over-simplification of real situations.…”
Section: A Related Workmentioning
confidence: 99%
“…Although Bluetooth technology provides levels of security based on the identification of the devices involved, the number of vulnerabilities via Bluetooth has increased considerably. The dynamics of mobile phone malware that propagates by proximity contact is considered in [7][8] where strategies for detecting and mitigating proximity malware from a simple local detection to a globally coordinated defence are studied. In [9], combination of four detection schemes is proposed, called SMS-Watchdog, which builds normal social behaviour profiles for each SMS user and then uses them to detect SMS anomalies in an online and streaming fashion.…”
Section: Related Workmentioning
confidence: 99%
“…But in a large-scale dynamic network, immunization strategy should cover 80% of nodes by stochastic immunization strategy or the whole topology should be known using a special immunization strategy [13,14]. Through local strategies, once a node finds itself infected, it sends an antivirus message to others immediately and the virus can be cleared accordingly [23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%
“…Zyba et al [23] presents an ideal scheme to restrain virus propagation through which a node can detect a virus locally. Once the virus has been found, the infected node immediately cuts off the communication or sends an antivirus message to adjacent nodes.…”
Section: Introductionmentioning
confidence: 99%