7 research outputs found

    Virus Attack on Mobile Phone as an Impediment to Network Stability

    Get PDF
    Viruses that infect cell phones especially Smartphone’s are beginning to emerge as a new obverse in the fight againstcomputer viruses. Cell phones viruses have become real as many smartphones and other modern cell phones featureinternet capability and contain storage space. Cell phones viruses can be harmful because they can steal personalinformation entered by the user that is useful in identity theft, make expensive calls using the victim’s account or rundown the battery quickly. In this paper, we will study mobile phone viruses and how the effect network stability.Keywords: Virus, Cell Phones, Smartphones, Operating System (OS

    Dawn Of The Mobile Malware: Reviewing Mobile Worms .

    Get PDF
    There is a new era of worm attack on mobile devices. In the past, worms on cell phones and PDA were more like science fiction but recently it is more than a reality. The objective of this paper is to brief the new threats on mobile devices and review the current hazards on it. We did taxonomy of current malware on mobile devices specifically worms and state their technical details

    MPeersim: Simulation Environment for Mobile P2P Networks

    Get PDF
    Abstract: In understanding technical aspects of technology, simulation environments play a very important role. Emergence of mobile P2P networks and their widespread adoption has accentuated the need for development of a simulation platform for modeling and analysis of these networks. This paper presents MPeersim, a simulation environment capable of modeling mobile P2P networks by incorporating configurable node and network related parameters to attain various statistics for subsequent analysis. MPeersim presents a novel concept of mobile P2P network monitoring. It not only provides with a pivotal platform for conducting propagation analysis of legitimate mobile P2P traffic but also of 13 mobile P2P malware families that encompass around 25% of the total discovered mobile malware. 3-tier statistics collection model of MPeersim enables it to collect generic mobile and network statistics on network and community levels while behaviour statistics on agent nodes. These statistics help detect network and community based mobile P2P threats and malware families

    On Detection of Current and Next-Generation Botnets.

    Full text link
    Botnets are one of the most serious security threats to the Internet and its end users. A botnet consists of compromised computers that are remotely coordinated by a botmaster under a Command and Control (C&C) infrastructure. Driven by financial incentives, botmasters leverage botnets to conduct various cybercrimes such as spamming, phishing, identity theft and Distributed-Denial-of-Service (DDoS) attacks. There are three main challenges facing botnet detection. First, code obfuscation is widely employed by current botnets, so signature-based detection is insufficient. Second, the C&C infrastructure of botnets has evolved rapidly. Any detection solution targeting one botnet instance can hardly keep up with this change. Third, the proliferation of powerful smartphones presents a new platform for future botnets. Defense techniques designed for existing botnets may be outsmarted when botnets invade smartphones. Recognizing these challenges, this dissertation proposes behavior-based botnet detection solutions at three different levels---the end host, the edge network and the Internet infrastructure---from a small scale to a large scale, and investigates the next-generation botnet targeting smartphones. It (1) addresses the problem of botnet seeding by devising a per-process containment scheme for end-host systems; (2) proposes a hybrid botnet detection framework for edge networks utilizing combined host- and network-level information; (3) explores the structural properties of botnet topologies and measures network components' capabilities of large-scale botnet detection at the Internet infrastructure level; and (4) presents a proof-of-concept mobile botnet employing SMS messages as the C&C and P2P as the topology to facilitate future research on countermeasures against next-generation botnets. The dissertation makes three primary contributions. First, the detection solutions proposed utilize intrinsic and fundamental behavior of botnets and are immune to malware obfuscation and traffic encryption. Second, the solutions are general enough to identify different types of botnets, not a specific botnet instance. They can also be extended to counter next-generation botnet threats. Third, the detection solutions function at multiple levels to meet various detection needs. They each take a different perspective but are highly complementary to each other, forming an integrated botnet detection framework.Ph.D.Computer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/91382/1/gracez_1.pd

    Discovering New Vulnerabilities in Computer Systems

    Get PDF
    Vulnerability research plays a key role in preventing and defending against malicious computer system exploitations. Driven by a multi-billion dollar underground economy, cyber criminals today tirelessly launch malicious exploitations, threatening every aspect of daily computing. to effectively protect computer systems from devastation, it is imperative to discover and mitigate vulnerabilities before they fall into the offensive parties\u27 hands. This dissertation is dedicated to the research and discovery of new design and deployment vulnerabilities in three very different types of computer systems.;The first vulnerability is found in the automatic malicious binary (malware) detection system. Binary analysis, a central piece of technology for malware detection, are divided into two classes, static analysis and dynamic analysis. State-of-the-art detection systems employ both classes of analyses to complement each other\u27s strengths and weaknesses for improved detection results. However, we found that the commonly seen design patterns may suffer from evasion attacks. We demonstrate attacks on the vulnerabilities by designing and implementing a novel binary obfuscation technique.;The second vulnerability is located in the design of server system power management. Technological advancements have improved server system power efficiency and facilitated energy proportional computing. However, the change of power profile makes the power consumption subjected to unaudited influences of remote parties, leaving the server systems vulnerable to energy-targeted malicious exploit. We demonstrate an energy abusing attack on a standalone open Web server, measure the extent of the damage, and present a preliminary defense strategy.;The third vulnerability is discovered in the application of server virtualization technologies. Server virtualization greatly benefits today\u27s data centers and brings pervasive cloud computing a step closer to the general public. However, the practice of physical co-hosting virtual machines with different security privileges risks introducing covert channels that seriously threaten the information security in the cloud. We study the construction of high-bandwidth covert channels via the memory sub-system, and show a practical exploit of cross-virtual-machine covert channels on virtualized x86 platforms

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    No full text
    corecore