Smartphone malware evolution revisited : Android next target?


Autoria(s): Schmidt, A.-D.; Schmidt, H.-G.; Batyuk, L.; Clausen, J.H.; Camtepe, Seyit A.; Albayrak, S.; Yildizli, C.
Data(s)

01/10/2009

Resumo

Smartphones started being targets for malware in June 2004 while malware count increased steadily until the introduction of a mandatory application signing mechanism for Symbian OS in 2006. From this point on, only few news could be read on this topic. Even despite of new emerging smartphone platforms, e.g. android and iPhone, malware writers seemed to lose interest in writing malware for smartphones giving users an unappropriate feeling of safety. In this paper, we revisit smartphone malware evolution for completing the appearance list until end of 2008. For contributing to smartphone malware research, we continue this list by adding descriptions on possible techniques for creating the first malware(s) for Android platform. Our approach involves usage of undocumented Android functions enabling us to execute native Linux application even on retail Android devices. This can be exploited to create malicious Linux applications and daemons using various methods to attack a device. In this manner, we also show that it is possible to bypass the Android permission system by using native Linux applications.

Identificador

http://eprints.qut.edu.au/58111/

Publicador

IEEE Conference Publications

Relação

DOI:10.1109/MALWARE.2009.5403026

Schmidt, A.-D., Schmidt, H.-G., Batyuk, L., Clausen, J.H., Camtepe, Seyit A., Albayrak, S., & Yildizli, C. (2009) Smartphone malware evolution revisited : Android next target? In Proceedings of the 4th International Conference on Malicious and Unwanted Software, IEEE Conference Publications , Montreal, Quebec, Canada, pp. 1-7.

Fonte

School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty

Palavras-Chave #080303 Computer System Security #Smartphone security #Malware detection
Tipo

Conference Paper