A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts

Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are becoming essential elements of our modern lives. Their large-scale pervasive deployment within the population has already attracted many malware authors, cybercriminals, and even governments. Since the first demonstrati...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2017-01, Vol.5, p.27740-27756
Hauptverfasser: Mahboubi, Arash, Camtepe, Seyit, Morarji, Hasmukh
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 27756
container_issue
container_start_page 27740
container_title IEEE access
container_volume 5
creator Mahboubi, Arash
Camtepe, Seyit
Morarji, Hasmukh
description Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are becoming essential elements of our modern lives. Their large-scale pervasive deployment within the population has already attracted many malware authors, cybercriminals, and even governments. Since the first demonstration of mobile malware by Marcos Velasco, millions of these have been developed with very sophisticated capabilities. They infiltrate highly secure networks using air-gap jumping capability (e.g., "Hammer Drill"and "Brutal Kangaroo") and spread through heterogeneous computing and communication platforms. Some of these cross-platform malware attacks are capable of infiltrating isolated control systems which might be running a variety of operating systems, such as Windows, Mac OS X, Solaris, and Linux. This paper investigates cross-platform/heterogeneous mobile malware that uses removable media, such as USB connection, to spread between incompatible computing platforms and operating systems. Deep analysis and modeling of cross-platform mobile malware are conducted at the micro (infection) and macro (spread) levels. The micro-level analysis aims to understand the cross-platform malware states and transitions between these states during node-to-node infection. The micro-level analysis helps derive the parameters essential for macro-level analysis, which are also crucial for the elaboration of suitable detection and prevention solutions. The macro-level analysis aims to identify the most important factors affecting cross-platform mobile malware spread within a digitized population. Through simulation, we show that identifying these factors helps to mitigate any outbreaks.
doi_str_mv 10.1109/ACCESS.2017.2772787
format Article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_proquest_journals_2455946825</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8105807</ieee_id><doaj_id>oai_doaj_org_article_28fd68959af141068de999d5cf80ebad</doaj_id><sourcerecordid>2455946825</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-40d53061dae36f3f107668d9da081145c28852d542c94c5c4d7ea842766b0fe43</originalsourceid><addsrcrecordid>eNpNUU1LAzEQXURBUX-Bl4Dn1iSbbJJjKX4ULArVc5gms3XLtqlJiuivN3VFnMsMj_cx8KrqitExY9TcTKbT28VizClTY64UV1odVWecNWZUy7o5_nefVpcprWkZXSCpzqrlhCzy3n-SsCV3IW6gJ3PMb8EnkgO5xy1G6LsvJA-YMYZVAcI-kXlYdj2SOfQfEJE8x7CDFeSuuMDWk5c37CKZbXbgcrqoTlroE17-7vPq9e72Zfoweny6n00njyMnqM4jQb2sacM8YN20dcuoahrtjYfyLBPSca0l91JwZ4STTniFoAUvrCVtUdTn1Wzw9QHWdhe7DcRPG6CzP0CIKwsxd65Hy3XrG22kgZYJRksMGmO8dK2muARfvK4Hr10M73tM2a7DPm7L-5YLKY1oNJeFVQ8sF0NKEdu_VEbtoRs7dGMP3djfborqalB1iPin0IxKTVX9DU9BibI</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455946825</pqid></control><display><type>article</type><title>A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Mahboubi, Arash ; Camtepe, Seyit ; Morarji, Hasmukh</creator><creatorcontrib>Mahboubi, Arash ; Camtepe, Seyit ; Morarji, Hasmukh</creatorcontrib><description>Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are becoming essential elements of our modern lives. Their large-scale pervasive deployment within the population has already attracted many malware authors, cybercriminals, and even governments. Since the first demonstration of mobile malware by Marcos Velasco, millions of these have been developed with very sophisticated capabilities. They infiltrate highly secure networks using air-gap jumping capability (e.g., "Hammer Drill"and "Brutal Kangaroo") and spread through heterogeneous computing and communication platforms. Some of these cross-platform malware attacks are capable of infiltrating isolated control systems which might be running a variety of operating systems, such as Windows, Mac OS X, Solaris, and Linux. This paper investigates cross-platform/heterogeneous mobile malware that uses removable media, such as USB connection, to spread between incompatible computing platforms and operating systems. Deep analysis and modeling of cross-platform mobile malware are conducted at the micro (infection) and macro (spread) levels. The micro-level analysis aims to understand the cross-platform malware states and transitions between these states during node-to-node infection. The micro-level analysis helps derive the parameters essential for macro-level analysis, which are also crucial for the elaboration of suitable detection and prevention solutions. The macro-level analysis aims to identify the most important factors affecting cross-platform mobile malware spread within a digitized population. Through simulation, we show that identifying these factors helps to mitigate any outbreaks.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2017.2772787</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Air gaps ; coloured Petri nets (CPN) modelling ; Computation ; Computational modeling ; Computer viruses ; Data buses ; Electronic devices ; epidemic model ; Formal method ; Hammer drills ; industrial control systems ; Internet of Things (IoT) ; Malware ; mobile ; Mobile communication ; mobile malware ; Mobile operating systems ; Operating systems ; Payloads ; Platforms ; Smart phones ; Smartphone ; Smartphones ; Universal Serial Bus</subject><ispartof>IEEE access, 2017-01, Vol.5, p.27740-27756</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-40d53061dae36f3f107668d9da081145c28852d542c94c5c4d7ea842766b0fe43</citedby><cites>FETCH-LOGICAL-c408t-40d53061dae36f3f107668d9da081145c28852d542c94c5c4d7ea842766b0fe43</cites><orcidid>0000-0002-0487-0615</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8105807$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,777,781,861,2096,27614,27905,27906,54914</link.rule.ids></links><search><creatorcontrib>Mahboubi, Arash</creatorcontrib><creatorcontrib>Camtepe, Seyit</creatorcontrib><creatorcontrib>Morarji, Hasmukh</creatorcontrib><title>A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts</title><title>IEEE access</title><addtitle>Access</addtitle><description>Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are becoming essential elements of our modern lives. Their large-scale pervasive deployment within the population has already attracted many malware authors, cybercriminals, and even governments. Since the first demonstration of mobile malware by Marcos Velasco, millions of these have been developed with very sophisticated capabilities. They infiltrate highly secure networks using air-gap jumping capability (e.g., "Hammer Drill"and "Brutal Kangaroo") and spread through heterogeneous computing and communication platforms. Some of these cross-platform malware attacks are capable of infiltrating isolated control systems which might be running a variety of operating systems, such as Windows, Mac OS X, Solaris, and Linux. This paper investigates cross-platform/heterogeneous mobile malware that uses removable media, such as USB connection, to spread between incompatible computing platforms and operating systems. Deep analysis and modeling of cross-platform mobile malware are conducted at the micro (infection) and macro (spread) levels. The micro-level analysis aims to understand the cross-platform malware states and transitions between these states during node-to-node infection. The micro-level analysis helps derive the parameters essential for macro-level analysis, which are also crucial for the elaboration of suitable detection and prevention solutions. The macro-level analysis aims to identify the most important factors affecting cross-platform mobile malware spread within a digitized population. Through simulation, we show that identifying these factors helps to mitigate any outbreaks.</description><subject>Air gaps</subject><subject>coloured Petri nets (CPN) modelling</subject><subject>Computation</subject><subject>Computational modeling</subject><subject>Computer viruses</subject><subject>Data buses</subject><subject>Electronic devices</subject><subject>epidemic model</subject><subject>Formal method</subject><subject>Hammer drills</subject><subject>industrial control systems</subject><subject>Internet of Things (IoT)</subject><subject>Malware</subject><subject>mobile</subject><subject>Mobile communication</subject><subject>mobile malware</subject><subject>Mobile operating systems</subject><subject>Operating systems</subject><subject>Payloads</subject><subject>Platforms</subject><subject>Smart phones</subject><subject>Smartphone</subject><subject>Smartphones</subject><subject>Universal Serial Bus</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1LAzEQXURBUX-Bl4Dn1iSbbJJjKX4ULArVc5gms3XLtqlJiuivN3VFnMsMj_cx8KrqitExY9TcTKbT28VizClTY64UV1odVWecNWZUy7o5_nefVpcprWkZXSCpzqrlhCzy3n-SsCV3IW6gJ3PMb8EnkgO5xy1G6LsvJA-YMYZVAcI-kXlYdj2SOfQfEJE8x7CDFeSuuMDWk5c37CKZbXbgcrqoTlroE17-7vPq9e72Zfoweny6n00njyMnqM4jQb2sacM8YN20dcuoahrtjYfyLBPSca0l91JwZ4STTniFoAUvrCVtUdTn1Wzw9QHWdhe7DcRPG6CzP0CIKwsxd65Hy3XrG22kgZYJRksMGmO8dK2muARfvK4Hr10M73tM2a7DPm7L-5YLKY1oNJeFVQ8sF0NKEdu_VEbtoRs7dGMP3djfborqalB1iPin0IxKTVX9DU9BibI</recordid><startdate>20170101</startdate><enddate>20170101</enddate><creator>Mahboubi, Arash</creator><creator>Camtepe, Seyit</creator><creator>Morarji, Hasmukh</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-0487-0615</orcidid></search><sort><creationdate>20170101</creationdate><title>A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts</title><author>Mahboubi, Arash ; Camtepe, Seyit ; Morarji, Hasmukh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-40d53061dae36f3f107668d9da081145c28852d542c94c5c4d7ea842766b0fe43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Air gaps</topic><topic>coloured Petri nets (CPN) modelling</topic><topic>Computation</topic><topic>Computational modeling</topic><topic>Computer viruses</topic><topic>Data buses</topic><topic>Electronic devices</topic><topic>epidemic model</topic><topic>Formal method</topic><topic>Hammer drills</topic><topic>industrial control systems</topic><topic>Internet of Things (IoT)</topic><topic>Malware</topic><topic>mobile</topic><topic>Mobile communication</topic><topic>mobile malware</topic><topic>Mobile operating systems</topic><topic>Operating systems</topic><topic>Payloads</topic><topic>Platforms</topic><topic>Smart phones</topic><topic>Smartphone</topic><topic>Smartphones</topic><topic>Universal Serial Bus</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mahboubi, Arash</creatorcontrib><creatorcontrib>Camtepe, Seyit</creatorcontrib><creatorcontrib>Morarji, Hasmukh</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mahboubi, Arash</au><au>Camtepe, Seyit</au><au>Morarji, Hasmukh</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2017-01-01</date><risdate>2017</risdate><volume>5</volume><spage>27740</spage><epage>27756</epage><pages>27740-27756</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are becoming essential elements of our modern lives. Their large-scale pervasive deployment within the population has already attracted many malware authors, cybercriminals, and even governments. Since the first demonstration of mobile malware by Marcos Velasco, millions of these have been developed with very sophisticated capabilities. They infiltrate highly secure networks using air-gap jumping capability (e.g., "Hammer Drill"and "Brutal Kangaroo") and spread through heterogeneous computing and communication platforms. Some of these cross-platform malware attacks are capable of infiltrating isolated control systems which might be running a variety of operating systems, such as Windows, Mac OS X, Solaris, and Linux. This paper investigates cross-platform/heterogeneous mobile malware that uses removable media, such as USB connection, to spread between incompatible computing platforms and operating systems. Deep analysis and modeling of cross-platform mobile malware are conducted at the micro (infection) and macro (spread) levels. The micro-level analysis aims to understand the cross-platform malware states and transitions between these states during node-to-node infection. The micro-level analysis helps derive the parameters essential for macro-level analysis, which are also crucial for the elaboration of suitable detection and prevention solutions. The macro-level analysis aims to identify the most important factors affecting cross-platform mobile malware spread within a digitized population. Through simulation, we show that identifying these factors helps to mitigate any outbreaks.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2017.2772787</doi><tpages>17</tpages><orcidid>https://orcid.org/0000-0002-0487-0615</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2017-01, Vol.5, p.27740-27756
issn 2169-3536
2169-3536
language eng
recordid cdi_proquest_journals_2455946825
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Air gaps
coloured Petri nets (CPN) modelling
Computation
Computational modeling
Computer viruses
Data buses
Electronic devices
epidemic model
Formal method
Hammer drills
industrial control systems
Internet of Things (IoT)
Malware
mobile
Mobile communication
mobile malware
Mobile operating systems
Operating systems
Payloads
Platforms
Smart phones
Smartphone
Smartphones
Universal Serial Bus
title A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T15%3A29%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Study%20on%20Formal%20Methods%20to%20Generalize%20Heterogeneous%20Mobile%20Malware%20Propagation%20and%20Their%20Impacts&rft.jtitle=IEEE%20access&rft.au=Mahboubi,%20Arash&rft.date=2017-01-01&rft.volume=5&rft.spage=27740&rft.epage=27756&rft.pages=27740-27756&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2017.2772787&rft_dat=%3Cproquest_doaj_%3E2455946825%3C/proquest_doaj_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455946825&rft_id=info:pmid/&rft_ieee_id=8105807&rft_doaj_id=oai_doaj_org_article_28fd68959af141068de999d5cf80ebad&rfr_iscdi=true