Mobile phones as computing devices: the viruses are coming!

@article{Dagon2004MobilePA,
  title={Mobile phones as computing devices: the viruses are coming!},
  author={David Dagon and Tom Martin and Thad Starner},
  journal={IEEE Pervasive Computing},
  year={2004},
  volume={3},
  pages={11-15}
}
Understanding existing threats against mobile phones helps us better protect our information and prepare for future dangers. Mobile phones have evolved from their roots as analog walkie-talkies to full-scale Internet-enabled computers. Today, mobile phone handsets are arguably the dominant computer form factor consumers purchase. But having such powerful networked computers leads to a new class of malware: viruses, worms, and trojans specifically designed for the mobile environment. Merely… 
A Review of Malicious Code Detection Techniques for Mobile Devices
TLDR
A questionnaire based survey is conducted to know about the mobile device security concern among the users, and a review of malicious code detection techniques for mobile devices are presented and discussed.
Malicious Software in Mobile Devices
TLDR
This chapter examines the scope of malicious software (malware) threats to mobile devices and significant highlights in malware evolution are pointed out that suggest that mobile devices are attracting more sophisticated malware attacks.
Virus Attack on Mobile Phone as an Impediment to Network Stability
TLDR
This paper will study mobile phone viruses and how the effect network stability is affected and how to deal with it.
Rootkits on Smart Phones: Attacks and Implications
TLDR
This paper demonstrates the threat of smart phone rootkits with three novel attacks that allow a remote attacker to snoop on a victim’s confidential conversations; snoops on a victims’ geographical location; and stealthily exhaust the battery on a Victims’ phone.
Chapter I Malicious Software in Mobile Devices
TLDR
This chapter examines the scope of malicious software (malware) threats to mobile devices and significant highlights in malware evolution are pointed out that suggest that mobile devices are attracting more sophisticated malware attacks.
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
TLDR
This survey paper provides a concise overview of mobile network security, attack vectors using the back end system and the web browser, but also the hardware layer and the user as attack enabler.
Can you infect me now?: malware propagation in mobile phone networks
TLDR
The speed and severity of random contact worms in mobile phone networks are evaluated, the denial-of-service effects such worms could have on the network are characterized, approaches to accelerate malware propagation are investigated, and the implications of defending networks against such attacks are discussed.
A Mobile Phone Malicious Software Detection Model with Behavior Checker
TLDR
The possible attacking model on mobile phone adapted from malicious attack on computer is discussed and the types of attack and appropriate solution model for mobile phone are presented.
Vulnerabilities attacks on mobile operating systems (Android versus iOS): A review
TLDR
An overview of the major reasons for threats in ios and Android operating systems is provided.
An architecture for threats detection in mobile operators networks
TLDR
A Telco architecture designed to prevent some mobile attacks that will allow network operators to counteract threats and thus to increase the trust of mobile users is proposed.
...
...

References

SHOWING 1-10 OF 11 REFERENCES
Access for sale: a new class of worm
TLDR
A new type of worm is introduced that enables a division of labor in the authors of self-reproducing malware, installing a back door on each infected system that opens only when presented a system-specific ticket generated by the worm's author.
Denial-of-service attacks on battery-powered mobile computers
TLDR
This work describes three main methods for an attacker to drain the battery and proposes a power-secure architecture to thwart these power attacks by employing multi-level authentication and energy signatures.
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
TLDR
A resurrecting duckling security policy model is presented, which describes secure transient association of a device with multiple serialised owners over the air in a short range wireless channel.
Denial of service attacks at the MAC layer in wireless ad hoc networks
TLDR
This work analyzes attacks that deny channel access by causing pockets of congestion in mobile ad hoc networks and focuses on the properties of the popular medium access control protocol, the IEEE 802.11x MAC protocol, which enable such attacks.
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
TLDR
It is concluded that 802.11 WEP is totally insecure, and some recommendations are provided to make the attack more efficient.
Attack Analysis and Detection for Ad Hoc Routing Protocols
TLDR
This paper introduces the concept of basic events, and defines a taxonomy of anomalous basic events by analyzing the basic security goals of an attack.
A defense-centric taxonomy based on attack manifestations
TLDR
The defense-centric attack taxonomy is shown to be a more effective predictor of a detector's ability to detect specific attacks, hence informing a defender that a given detector is competent against an entire class of attacks.
Dynamic Source Routing in Ad Hoc Wireless Networks
TLDR
This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
The quest for security in mobile ad hoc networks
TLDR
An overview of security problems for mobile ad hoc networks is provided, distinguishing the threats on basic mechanisms and on security mechanisms and the solution to protect the security mechanisms is described.
Access for Sale
  • Proc . Network and Distributed System Security ( NDSS ) , Internet Soc .
...
...