Securing mobile devices: malware mitigation methods

نویسندگان

  • Anastasia Skovoroda
  • Dennis Gamayunov
چکیده

Malware on mobile handsets has always been a point of concern for its users. With the widespread adoption of smartphones and tablets and the emergence of centralized application markets it started to represent a significant threat. This situation has led to the development of defence methods for securing mobile devices coming from operating system developers, antivirus vendors and security researchers. In this paper we focus on the solutions proposed by security researchers which include both methods inherited from malware detection on personal computers and new methods specific to mobile device environment. This paper gives an overview of the history and development of mobile malware and provides a survey of the methods proposed for malware mitigation on mobile devices in the last years.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers

Much of the attention surrounding mobile malware has focused on the in-depth analysis of malicious applications. While bringing the community valuable information about the methods used and data targeted by malware writers, such work has not yet been able to quantify the prevalence with which mobile devices are actually infected. In this paper, we present the first such attempt through a study ...

متن کامل

Tapjacking Threats and Mitigation Techniques for Android Applications

With the increased dependency on web applications through mobile devices, malicious attack techniques have now shifted from traditional web applications running on desktop or laptop (allowing mouse click-based interactions) to mobile applications running on mobile devices (allowing touch-based interactions). Clickjacking is a type of malicious attack originating in web applications, where victi...

متن کامل

Titan: A Carrier-based Approach for Detecting and Mitigating Mobile Malware

The ubiquity of mobile devices and their evolution as computing platforms has made them lucrative targets for malware. Malware, such as spyware, trojans, rootkits and botnets that have traditionally plagued PCs are now increasingly targeting mobile devices and are also referred to as mobile malware. Cybercriminal attacks have used mobile malware trojans to steal and transmit users’ personal inf...

متن کامل

Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware

The ubiquity of mobile devices and their evolution as computing platforms has made them lucrative targets for malware. Malware, such as spyware, trojans, rootkits and botnets that have traditionally plagued PCs are now increasingly targeting mobile devices and are also referred to as mobile malware. Cybercriminal attacks have used mobile malware trojans to steal and transmit users’ personal inf...

متن کامل

Game theoretic path selection to support security in device-to-device communications

Device-to-Device (D2D) communication is expected to be a key feature supported by 5G networks, especially due to the proliferation of Mobile Edge Computing (MEC), which has a prominent role in reducing network stress by shifting computational tasks from the Internet to the mobile edge. Apart from being part of MEC, D2D can extend cellular coverage allowing users to communicate directly when tel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JoWUA

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2015