The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers

  title={The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers},
  author={Charles Lever and Manos Antonakakis and Bradley Reaves and Patrick Traynor and Wenke Lee},
Much of the attention surrounding mobile malware has focused on the in-depth analysis of malicious applications. While bringing the community valuable information about the methods used and data targeted by malware writers, such work has not yet been able to quantify the prevalence with which mobile devices are actually infected. In this paper, we present the first such attempt through a study of the hosting infrastructure used by mobile applications. Using DNS traffic collected over the course… CONTINUE READING
Highly Cited
This paper has 49 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 36 extracted citations


Publications referenced by this paper.
Showing 1-10 of 41 references

Google Play: Android’s Bouncer can be pwned

  • M. Kassner
  • security/google…
  • 2012
1 Excerpt

Malicious app penetrates iTunes store to test security

  • BBC News
  • technology-15635408,
  • 2012
1 Excerpt

Android.Gonesixty. http: // writeup.jsp?docid=2011-093001-2649-99

  • Nino Fred Gutierrez
  • 2011
1 Excerpt

Similar Papers

Loading similar papers…