2009 28th IEEE International Symposium on Reliable Distributed Systems 2009
DOI: 10.1109/srds.2009.21
|View full text |Cite
|
Sign up to set email alerts
|

Designing System-Level Defenses against Cellphone Malware

Abstract: Abstract-Cellphones are increasingly becoming attractive targets of various malware, which not only cause privacy leakage, extra charges, and depletion of battery power, but also introduce malicious traffic into networks. In this work, we seek system-level solutions to handle these security threats. Specifically, we propose a mandatory access control-based defense to blocking malware that launch attacks through creating new processes for execution. To combat more elaborated malware which redirect program flows… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(23 citation statements)
references
References 16 publications
(16 reference statements)
0
22
0
Order By: Relevance
“…Xie et al [52] propose access-control defense to limit the accesses of malware to critical system resources. VirusMeter [35] identifies malware that causes excessive battery power consumption on mobile devices.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Xie et al [52] propose access-control defense to limit the accesses of malware to critical system resources. VirusMeter [35] identifies malware that causes excessive battery power consumption on mobile devices.…”
Section: Related Workmentioning
confidence: 99%
“…As of October 2011, Tencent Mobile Security Laboratory [48] identified around 13,000 and 6,000 mobile phone viruses in the Symbian and Android platforms respectively. Given the threat of smartphone malware, researchers (e.g., [10,11,13,35,42,44,46,52]) have proposed various smartphone malware detection systems, and anti-virus software companies also develop commercial security solutions to detect smartphone malware. However, new pieces of smartphone malware keep evolving and attacking various distributions of smartphone platforms [36].…”
Section: Introductionmentioning
confidence: 99%
“…Xie et al [33] proposed a two-level defense, which consists of an access-control based scheme and a GTT-based scheme to contain the propagation of MMS-based worms.…”
Section: Worm Containment Modelsmentioning
confidence: 99%
“…The use of a graphical Turing test was already introduced by Xie et al [5] to prevent malicious codes diffusion. They take as an example the case of a MMS-based malware.…”
Section: Related Workmentioning
confidence: 99%