Skip to main content

A Mobile Phone Malicious Software Detection Model with Behavior Checker

  • Conference paper
Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 (HSI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3597))

Included in the following conference series:

Abstract

There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Davis, R.: Exploring computer viruses. In: Fourth Aerospace Computer Security Applications Conference, December 12-16, pp. 7–11 (1988)

    Google Scholar 

  2. Slade, R.: Guide to computer viruses, 2nd edn. Springer, New York (1996)

    MATH  Google Scholar 

  3. Jamaluddin, J., Zotou, N., Coulton, P.: Mobile phone vulnerabilities: a new generation of malware. In: 2004 IEEE International Symposium On Consumer Electronics, September 1-3, pp. 199–202 (2004)

    Google Scholar 

  4. Dagon, D., Martin, T., Starner, T.: Mobile Phones as Computing Devices: The Viruses are Coming!, Pervasive Computing. IEEE 3(4), 11–15 (2004)

    Google Scholar 

  5. Gupta, V., Gupta, S.: Securing the wireless internet. IEEE Communication Magazine 39(12), 68–74 (2001)

    Article  Google Scholar 

  6. eFinland. Preparing for Mobile Phone Viruses [Online] (November 1, 2004), Available: http://www.e.finland.fi/netcomm/news/showarticle.asp?intNWSAID=29431

  7. BluejackQ (No Date). What is Bluejacking [Online]. Available: http://www.bluejackq.com/what-is-bluejacking.shtml

  8. BBC News World Edition. Mobile Virus Threat Looms Large [Online] Available: http://news.bbc.co.uk/2/hi/technology/2690253.stm

  9. Belson, K.: A Brand New Worry: Mobile Phone Viruses, International Herald Tribune: The IHT Online Available: http://www.iht.com/cgibin/generic.cgi?template=articleprint.tmplh&ArticleID=119373

  10. Ludwig, M.A.: Black Book of Computer Viruses. American Eagle Publication, Inc. (1995)

    Google Scholar 

  11. Ellen, M.: Behavior blocking repels new viruses [Online] (February 1, 2002), Available: http://www.nwfusion.com/news/2002/0128antivirus.html

  12. Denning, D.: An Intrusion-Detection Model. IEEE Transactions on Software Engineering 13(2), 222–232 (1987)

    Article  Google Scholar 

  13. Teng, H., Chen, K., Lu, S.: Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns. In: Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pp. 278–284 (May 1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yap, T.S., Ewe, H.T. (2005). A Mobile Phone Malicious Software Detection Model with Behavior Checker. In: Shimojo, S., Ichii, S., Ling, TW., Song, KH. (eds) Web and Communication Technologies and Internet-Related Social Issues - HSI 2005. HSI 2005. Lecture Notes in Computer Science, vol 3597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527725_7

Download citation

  • DOI: https://doi.org/10.1007/11527725_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27830-6

  • Online ISBN: 978-3-540-31808-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics