Smartphone malware evolution revisited: Android next target?
- 1 October 2009
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Smartphones started being targets for malware in June 2004 while malware count increased steadily until the introduction of a mandatory application signing mechanism for Symbian OS in 2006. From this point on, only few news could be read on this topic. Even despite of new emerging smartphone platforms, e.g. android and iPhone, malware writers seemed to lose interest in writing malware for smartphones giving users an unappropriate feeling of safety. In this paper, we revisit smartphone malware evolution for completing the appearance list until end of 2008. For contributing to smartphone malware research, we continue this list by adding descriptions on possible techniques for creating the first malware(s) for Android platform. Our approach involves usage of undocumented Android functions enabling us to execute native Linux application even on retail Android devices. This can be exploited to create malicious Linux applications and daemons using various methods to attack a device. In this manner, we also show that it is possible to bypass the Android permission system by using native Linux applications.Keywords
This publication has 13 references indexed in Scilit:
- Developing and Benchmarking Native Linux Applications on AndroidPublished by Springer Science and Business Media LLC ,2009
- Is It Finally Time to Worry about Mobile Malware?Computer, 2008
- On the Effort to Create Smartphone Worms in Windows MobilePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Epidemics of Mobile Worms2007 IEEE International Performance, Computing, and Communications Conference, 2007
- Malware Goes MobileScientific American, 2006
- Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's BatteryPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Modeling epidemic spreading in mobile environmentsPublished by Association for Computing Machinery (ACM) ,2005
- Mobile phones: the next frontier for hackers?Computer, 2005
- Mobile Phones as Computing Devices: The Viruses are Coming!IEEE Pervasive Computing, 2004
- Mobile phone vulnerabilities: a new generation of malwarePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004