A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts
Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are becoming essential elements of our modern lives. Their large-scale pervasive deployment within the population has already attracted many malware authors, cybercriminals, and even governments. Since the first demonstrati...
Gespeichert in:
Veröffentlicht in: | IEEE access 2017-01, Vol.5, p.27740-27756 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 27756 |
---|---|
container_issue | |
container_start_page | 27740 |
container_title | IEEE access |
container_volume | 5 |
creator | Mahboubi, Arash Camtepe, Seyit Morarji, Hasmukh |
description | Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are becoming essential elements of our modern lives. Their large-scale pervasive deployment within the population has already attracted many malware authors, cybercriminals, and even governments. Since the first demonstration of mobile malware by Marcos Velasco, millions of these have been developed with very sophisticated capabilities. They infiltrate highly secure networks using air-gap jumping capability (e.g., "Hammer Drill"and "Brutal Kangaroo") and spread through heterogeneous computing and communication platforms. Some of these cross-platform malware attacks are capable of infiltrating isolated control systems which might be running a variety of operating systems, such as Windows, Mac OS X, Solaris, and Linux. This paper investigates cross-platform/heterogeneous mobile malware that uses removable media, such as USB connection, to spread between incompatible computing platforms and operating systems. Deep analysis and modeling of cross-platform mobile malware are conducted at the micro (infection) and macro (spread) levels. The micro-level analysis aims to understand the cross-platform malware states and transitions between these states during node-to-node infection. The micro-level analysis helps derive the parameters essential for macro-level analysis, which are also crucial for the elaboration of suitable detection and prevention solutions. The macro-level analysis aims to identify the most important factors affecting cross-platform mobile malware spread within a digitized population. Through simulation, we show that identifying these factors helps to mitigate any outbreaks. |
doi_str_mv | 10.1109/ACCESS.2017.2772787 |
format | Article |
fullrecord | <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_proquest_journals_2455946825</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8105807</ieee_id><doaj_id>oai_doaj_org_article_28fd68959af141068de999d5cf80ebad</doaj_id><sourcerecordid>2455946825</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-40d53061dae36f3f107668d9da081145c28852d542c94c5c4d7ea842766b0fe43</originalsourceid><addsrcrecordid>eNpNUU1LAzEQXURBUX-Bl4Dn1iSbbJJjKX4ULArVc5gms3XLtqlJiuivN3VFnMsMj_cx8KrqitExY9TcTKbT28VizClTY64UV1odVWecNWZUy7o5_nefVpcprWkZXSCpzqrlhCzy3n-SsCV3IW6gJ3PMb8EnkgO5xy1G6LsvJA-YMYZVAcI-kXlYdj2SOfQfEJE8x7CDFeSuuMDWk5c37CKZbXbgcrqoTlroE17-7vPq9e72Zfoweny6n00njyMnqM4jQb2sacM8YN20dcuoahrtjYfyLBPSca0l91JwZ4STTniFoAUvrCVtUdTn1Wzw9QHWdhe7DcRPG6CzP0CIKwsxd65Hy3XrG22kgZYJRksMGmO8dK2muARfvK4Hr10M73tM2a7DPm7L-5YLKY1oNJeFVQ8sF0NKEdu_VEbtoRs7dGMP3djfborqalB1iPin0IxKTVX9DU9BibI</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455946825</pqid></control><display><type>article</type><title>A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Mahboubi, Arash ; Camtepe, Seyit ; Morarji, Hasmukh</creator><creatorcontrib>Mahboubi, Arash ; Camtepe, Seyit ; Morarji, Hasmukh</creatorcontrib><description>Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are becoming essential elements of our modern lives. Their large-scale pervasive deployment within the population has already attracted many malware authors, cybercriminals, and even governments. Since the first demonstration of mobile malware by Marcos Velasco, millions of these have been developed with very sophisticated capabilities. They infiltrate highly secure networks using air-gap jumping capability (e.g., "Hammer Drill"and "Brutal Kangaroo") and spread through heterogeneous computing and communication platforms. Some of these cross-platform malware attacks are capable of infiltrating isolated control systems which might be running a variety of operating systems, such as Windows, Mac OS X, Solaris, and Linux. This paper investigates cross-platform/heterogeneous mobile malware that uses removable media, such as USB connection, to spread between incompatible computing platforms and operating systems. Deep analysis and modeling of cross-platform mobile malware are conducted at the micro (infection) and macro (spread) levels. The micro-level analysis aims to understand the cross-platform malware states and transitions between these states during node-to-node infection. The micro-level analysis helps derive the parameters essential for macro-level analysis, which are also crucial for the elaboration of suitable detection and prevention solutions. The macro-level analysis aims to identify the most important factors affecting cross-platform mobile malware spread within a digitized population. Through simulation, we show that identifying these factors helps to mitigate any outbreaks.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2017.2772787</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Air gaps ; coloured Petri nets (CPN) modelling ; Computation ; Computational modeling ; Computer viruses ; Data buses ; Electronic devices ; epidemic model ; Formal method ; Hammer drills ; industrial control systems ; Internet of Things (IoT) ; Malware ; mobile ; Mobile communication ; mobile malware ; Mobile operating systems ; Operating systems ; Payloads ; Platforms ; Smart phones ; Smartphone ; Smartphones ; Universal Serial Bus</subject><ispartof>IEEE access, 2017-01, Vol.5, p.27740-27756</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-40d53061dae36f3f107668d9da081145c28852d542c94c5c4d7ea842766b0fe43</citedby><cites>FETCH-LOGICAL-c408t-40d53061dae36f3f107668d9da081145c28852d542c94c5c4d7ea842766b0fe43</cites><orcidid>0000-0002-0487-0615</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8105807$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,777,781,861,2096,27614,27905,27906,54914</link.rule.ids></links><search><creatorcontrib>Mahboubi, Arash</creatorcontrib><creatorcontrib>Camtepe, Seyit</creatorcontrib><creatorcontrib>Morarji, Hasmukh</creatorcontrib><title>A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts</title><title>IEEE access</title><addtitle>Access</addtitle><description>Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are becoming essential elements of our modern lives. Their large-scale pervasive deployment within the population has already attracted many malware authors, cybercriminals, and even governments. Since the first demonstration of mobile malware by Marcos Velasco, millions of these have been developed with very sophisticated capabilities. They infiltrate highly secure networks using air-gap jumping capability (e.g., "Hammer Drill"and "Brutal Kangaroo") and spread through heterogeneous computing and communication platforms. Some of these cross-platform malware attacks are capable of infiltrating isolated control systems which might be running a variety of operating systems, such as Windows, Mac OS X, Solaris, and Linux. This paper investigates cross-platform/heterogeneous mobile malware that uses removable media, such as USB connection, to spread between incompatible computing platforms and operating systems. Deep analysis and modeling of cross-platform mobile malware are conducted at the micro (infection) and macro (spread) levels. The micro-level analysis aims to understand the cross-platform malware states and transitions between these states during node-to-node infection. The micro-level analysis helps derive the parameters essential for macro-level analysis, which are also crucial for the elaboration of suitable detection and prevention solutions. The macro-level analysis aims to identify the most important factors affecting cross-platform mobile malware spread within a digitized population. Through simulation, we show that identifying these factors helps to mitigate any outbreaks.</description><subject>Air gaps</subject><subject>coloured Petri nets (CPN) modelling</subject><subject>Computation</subject><subject>Computational modeling</subject><subject>Computer viruses</subject><subject>Data buses</subject><subject>Electronic devices</subject><subject>epidemic model</subject><subject>Formal method</subject><subject>Hammer drills</subject><subject>industrial control systems</subject><subject>Internet of Things (IoT)</subject><subject>Malware</subject><subject>mobile</subject><subject>Mobile communication</subject><subject>mobile malware</subject><subject>Mobile operating systems</subject><subject>Operating systems</subject><subject>Payloads</subject><subject>Platforms</subject><subject>Smart phones</subject><subject>Smartphone</subject><subject>Smartphones</subject><subject>Universal Serial Bus</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1LAzEQXURBUX-Bl4Dn1iSbbJJjKX4ULArVc5gms3XLtqlJiuivN3VFnMsMj_cx8KrqitExY9TcTKbT28VizClTY64UV1odVWecNWZUy7o5_nefVpcprWkZXSCpzqrlhCzy3n-SsCV3IW6gJ3PMb8EnkgO5xy1G6LsvJA-YMYZVAcI-kXlYdj2SOfQfEJE8x7CDFeSuuMDWk5c37CKZbXbgcrqoTlroE17-7vPq9e72Zfoweny6n00njyMnqM4jQb2sacM8YN20dcuoahrtjYfyLBPSca0l91JwZ4STTniFoAUvrCVtUdTn1Wzw9QHWdhe7DcRPG6CzP0CIKwsxd65Hy3XrG22kgZYJRksMGmO8dK2muARfvK4Hr10M73tM2a7DPm7L-5YLKY1oNJeFVQ8sF0NKEdu_VEbtoRs7dGMP3djfborqalB1iPin0IxKTVX9DU9BibI</recordid><startdate>20170101</startdate><enddate>20170101</enddate><creator>Mahboubi, Arash</creator><creator>Camtepe, Seyit</creator><creator>Morarji, Hasmukh</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-0487-0615</orcidid></search><sort><creationdate>20170101</creationdate><title>A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts</title><author>Mahboubi, Arash ; Camtepe, Seyit ; Morarji, Hasmukh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-40d53061dae36f3f107668d9da081145c28852d542c94c5c4d7ea842766b0fe43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Air gaps</topic><topic>coloured Petri nets (CPN) modelling</topic><topic>Computation</topic><topic>Computational modeling</topic><topic>Computer viruses</topic><topic>Data buses</topic><topic>Electronic devices</topic><topic>epidemic model</topic><topic>Formal method</topic><topic>Hammer drills</topic><topic>industrial control systems</topic><topic>Internet of Things (IoT)</topic><topic>Malware</topic><topic>mobile</topic><topic>Mobile communication</topic><topic>mobile malware</topic><topic>Mobile operating systems</topic><topic>Operating systems</topic><topic>Payloads</topic><topic>Platforms</topic><topic>Smart phones</topic><topic>Smartphone</topic><topic>Smartphones</topic><topic>Universal Serial Bus</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mahboubi, Arash</creatorcontrib><creatorcontrib>Camtepe, Seyit</creatorcontrib><creatorcontrib>Morarji, Hasmukh</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mahboubi, Arash</au><au>Camtepe, Seyit</au><au>Morarji, Hasmukh</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2017-01-01</date><risdate>2017</risdate><volume>5</volume><spage>27740</spage><epage>27756</epage><pages>27740-27756</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are becoming essential elements of our modern lives. Their large-scale pervasive deployment within the population has already attracted many malware authors, cybercriminals, and even governments. Since the first demonstration of mobile malware by Marcos Velasco, millions of these have been developed with very sophisticated capabilities. They infiltrate highly secure networks using air-gap jumping capability (e.g., "Hammer Drill"and "Brutal Kangaroo") and spread through heterogeneous computing and communication platforms. Some of these cross-platform malware attacks are capable of infiltrating isolated control systems which might be running a variety of operating systems, such as Windows, Mac OS X, Solaris, and Linux. This paper investigates cross-platform/heterogeneous mobile malware that uses removable media, such as USB connection, to spread between incompatible computing platforms and operating systems. Deep analysis and modeling of cross-platform mobile malware are conducted at the micro (infection) and macro (spread) levels. The micro-level analysis aims to understand the cross-platform malware states and transitions between these states during node-to-node infection. The micro-level analysis helps derive the parameters essential for macro-level analysis, which are also crucial for the elaboration of suitable detection and prevention solutions. The macro-level analysis aims to identify the most important factors affecting cross-platform mobile malware spread within a digitized population. Through simulation, we show that identifying these factors helps to mitigate any outbreaks.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2017.2772787</doi><tpages>17</tpages><orcidid>https://orcid.org/0000-0002-0487-0615</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2017-01, Vol.5, p.27740-27756 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_proquest_journals_2455946825 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Air gaps coloured Petri nets (CPN) modelling Computation Computational modeling Computer viruses Data buses Electronic devices epidemic model Formal method Hammer drills industrial control systems Internet of Things (IoT) Malware mobile Mobile communication mobile malware Mobile operating systems Operating systems Payloads Platforms Smart phones Smartphone Smartphones Universal Serial Bus |
title | A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T15%3A29%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Study%20on%20Formal%20Methods%20to%20Generalize%20Heterogeneous%20Mobile%20Malware%20Propagation%20and%20Their%20Impacts&rft.jtitle=IEEE%20access&rft.au=Mahboubi,%20Arash&rft.date=2017-01-01&rft.volume=5&rft.spage=27740&rft.epage=27756&rft.pages=27740-27756&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2017.2772787&rft_dat=%3Cproquest_doaj_%3E2455946825%3C/proquest_doaj_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455946825&rft_id=info:pmid/&rft_ieee_id=8105807&rft_doaj_id=oai_doaj_org_article_28fd68959af141068de999d5cf80ebad&rfr_iscdi=true |