A Mobile Phone Malicious Software Detection Model with Behavior Checker

There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attack...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Yap, Teck Sung, Ewe, Hong Tat
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 65
container_issue
container_start_page 57
container_title
container_volume
creator Yap, Teck Sung
Ewe, Hong Tat
description There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented.
doi_str_mv 10.1007/11527725_7
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_17026571</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17026571</sourcerecordid><originalsourceid>FETCH-LOGICAL-c259t-9093ae6443bd5b037558836d67bdcad379353adc646cbdaa84e5d93087562d2c3</originalsourceid><addsrcrecordid>eNpFkLtOwzAYRs1NopQuPIEXJJaA7T--jaVAQWoFEjBHju0S0xBXdqDi7QkCwXSGc_QNH0InlJxTQuQFpZxJyXgld9BESwW8JEAVUWoXjaigtAAo9d6fYwOI2EcjAoQVWpZwiI5yfiVkUJqN0HyKl7EOrccPTew8Xpo22BDfM36Mq35rksdXvve2D7EbSudbvA19gy99Yz5CTHjWeLv26RgdrEyb_eSXY_R8c_00uy0W9_O72XRRWMZ1X2iiwXhRllA7XhOQnCsFwglZO2scSA0cjLOiFLZ2xqjSc6eBKMkFc8zCGJ3-7G5MtqZdJdPZkKtNCm8mfVZUEia4pEN39tPlQXUvPlV1jOtcUVJ9H1n9HwlfLt1efw</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A Mobile Phone Malicious Software Detection Model with Behavior Checker</title><source>Springer Books</source><creator>Yap, Teck Sung ; Ewe, Hong Tat</creator><contributor>Ling, Tok-Wang ; Ichii, Shingo ; Shimojo, Shinji ; Song, Kwan-Ho</contributor><creatorcontrib>Yap, Teck Sung ; Ewe, Hong Tat ; Ling, Tok-Wang ; Ichii, Shingo ; Shimojo, Shinji ; Song, Kwan-Ho</creatorcontrib><description>There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540278306</identifier><identifier>ISBN: 3540278303</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540318088</identifier><identifier>EISBN: 3540318089</identifier><identifier>DOI: 10.1007/11527725_7</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Computer Virus ; Exact sciences and technology ; Integrity Checker ; Malicious Activity ; Malicious Attack ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Mobile Phone ; Software</subject><ispartof>Lecture notes in computer science, 2005, p.57-65</ispartof><rights>Springer-Verlag Berlin Heidelberg 2005</rights><rights>2005 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c259t-9093ae6443bd5b037558836d67bdcad379353adc646cbdaa84e5d93087562d2c3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11527725_7$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11527725_7$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4048,4049,27924,38254,41441,42510</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=17026571$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Ling, Tok-Wang</contributor><contributor>Ichii, Shingo</contributor><contributor>Shimojo, Shinji</contributor><contributor>Song, Kwan-Ho</contributor><creatorcontrib>Yap, Teck Sung</creatorcontrib><creatorcontrib>Ewe, Hong Tat</creatorcontrib><title>A Mobile Phone Malicious Software Detection Model with Behavior Checker</title><title>Lecture notes in computer science</title><description>There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Computer Virus</subject><subject>Exact sciences and technology</subject><subject>Integrity Checker</subject><subject>Malicious Activity</subject><subject>Malicious Attack</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Mobile Phone</subject><subject>Software</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540278306</isbn><isbn>3540278303</isbn><isbn>9783540318088</isbn><isbn>3540318089</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpFkLtOwzAYRs1NopQuPIEXJJaA7T--jaVAQWoFEjBHju0S0xBXdqDi7QkCwXSGc_QNH0InlJxTQuQFpZxJyXgld9BESwW8JEAVUWoXjaigtAAo9d6fYwOI2EcjAoQVWpZwiI5yfiVkUJqN0HyKl7EOrccPTew8Xpo22BDfM36Mq35rksdXvve2D7EbSudbvA19gy99Yz5CTHjWeLv26RgdrEyb_eSXY_R8c_00uy0W9_O72XRRWMZ1X2iiwXhRllA7XhOQnCsFwglZO2scSA0cjLOiFLZ2xqjSc6eBKMkFc8zCGJ3-7G5MtqZdJdPZkKtNCm8mfVZUEia4pEN39tPlQXUvPlV1jOtcUVJ9H1n9HwlfLt1efw</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Yap, Teck Sung</creator><creator>Ewe, Hong Tat</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>A Mobile Phone Malicious Software Detection Model with Behavior Checker</title><author>Yap, Teck Sung ; Ewe, Hong Tat</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c259t-9093ae6443bd5b037558836d67bdcad379353adc646cbdaa84e5d93087562d2c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Computer Virus</topic><topic>Exact sciences and technology</topic><topic>Integrity Checker</topic><topic>Malicious Activity</topic><topic>Malicious Attack</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Mobile Phone</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yap, Teck Sung</creatorcontrib><creatorcontrib>Ewe, Hong Tat</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yap, Teck Sung</au><au>Ewe, Hong Tat</au><au>Ling, Tok-Wang</au><au>Ichii, Shingo</au><au>Shimojo, Shinji</au><au>Song, Kwan-Ho</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A Mobile Phone Malicious Software Detection Model with Behavior Checker</atitle><btitle>Lecture notes in computer science</btitle><date>2005</date><risdate>2005</risdate><spage>57</spage><epage>65</epage><pages>57-65</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540278306</isbn><isbn>3540278303</isbn><eisbn>9783540318088</eisbn><eisbn>3540318089</eisbn><abstract>There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11527725_7</doi><tpages>9</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture notes in computer science, 2005, p.57-65
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_17026571
source Springer Books
subjects Applied sciences
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Computer Virus
Exact sciences and technology
Integrity Checker
Malicious Activity
Malicious Attack
Memory and file management (including protection and security)
Memory organisation. Data processing
Mobile Phone
Software
title A Mobile Phone Malicious Software Detection Model with Behavior Checker
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T19%3A13%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20Mobile%20Phone%20Malicious%20Software%20Detection%20Model%20with%20Behavior%20Checker&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Yap,%20Teck%20Sung&rft.date=2005&rft.spage=57&rft.epage=65&rft.pages=57-65&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540278306&rft.isbn_list=3540278303&rft_id=info:doi/10.1007/11527725_7&rft_dat=%3Cpascalfrancis_sprin%3E17026571%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540318088&rft.eisbn_list=3540318089&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true