Defending Mobile Phones from Proximity Malware

被引:22
|
作者
Zyba, Gjergji [1 ]
Voelker, Geoffrey M. [1 ]
Liljenstam, Michael [2 ]
Mehes, Andras [2 ]
Johansson, Per [3 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[2] Ericsson Res, Stockholm, Sweden
[3] California Inst Telecommun & Informat Technol, La Jolla, CA USA
关键词
D O I
10.1109/INFCOM.2009.5062067
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable challenges to malware detection and mitigation. Unlike malware that propagates using the network, where the provider can employ centralized defenses, proximity malware can propagate in an entirely distributed fashion. In this paper we consider the dynamics of mobile phone malware that propagates by proximity contact, and we evaluate potential defenses against it. Defending against proximity malware is particularly challenging since it is difficult to piece together global dynamics from just pair-wise device interactions. Whereas traditional network defenses depend upon observing aggregated network activity to detect correlated or anomalous behavior, proximity malware detection must begin at the device. As a result, we explore three strategies for detecting and mitigating proximity malware that span the spectrum from simple local detection to a globally coordinated defense. Using insight from a combination of real-world traces, analytic epidemic models, and synthetic mobility models, we simulate proximity malware propagation and defense at the scale of a university campus. We find that local proximity-based dissemination of signatures can limit malware propagation. Globally coordinated strategies with broadcast dissemination are substantially more effective, but rely upon more demanding infrastructure within the provider.
引用
收藏
页码:1503 / +
页数:2
相关论文
共 50 条
  • [1] Insights into Malware Detection and Prevention on Mobile Phones
    Yan, Qiang
    Li, Yingjiu
    Li, Tieyan
    Deng, Robert
    SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 242 - +
  • [2] Security of Mobile Phones: Prevention Methods for The Spread of Malware
    Ghallali, Mohamed
    El Ouahidi, Bouabid
    2012 6TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT), 2012, : 648 - 651
  • [3] ACOUSTICS BASED PROXIMITY DETECTOR FOR MOBILE PHONES
    Cohen, Zacharie
    Rodan, Andy
    Eilam, Alon
    Lifshits, Pavel
    2020 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS (SIPS), 2020, : 249 - 253
  • [4] User's Proximity Effects in Mobile Phones
    Pelosi, Mauro
    Franek, Ondrej
    Knudsen, Mikael B.
    Pedersen, Gert F.
    2009 3RD EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION, VOLS 1-6, 2009, : 971 - +
  • [5] Defending Against Sensor-Sniffing Attacks on Mobile Phones
    Cai, Liang
    Machiraju, Sridhar
    Chen, Hao
    MOBIHELD 09, 2009, : 31 - 36
  • [6] Antenna Proximity Effects for Talk and Data Modes in Mobile Phones
    Pelosi, M.
    Franek, O.
    Knudsen, M. B.
    Pedersen, G. F.
    Andersen, J. B.
    IEEE ANTENNAS AND PROPAGATION MAGAZINE, 2010, 52 (03) : 15 - 27
  • [7] PeopleTones: A System for the Detection and Notification of Buddy Proximity on Mobile Phones
    Li, Kevin A.
    Sohn, Timothy
    Huang, Steven
    Griswold, William G.
    MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2008, : 160 - 173
  • [8] On the Potential of Limitation-oriented Malware Detection and Prevention Techniques on Mobile Phones
    Yan, Qiang
    Deng, Robert H.
    Li, Yingjiu
    Li, Tieyan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2010, 4 (01): : 21 - 30
  • [9] Conflicts related to the presence of mobile phones antennas: a reading by the economics of proximity
    Olszak, Eric
    REVUE D ECONOMIE REGIONALE ET URBAINE, 2012, (03): : 379 - 405
  • [10] Defending against the malware flood
    Sim G.
    Network Security, 2018, 2018 (05) : 12 - 13