725,156 research outputs found

    Malware detection techniques for mobile devices

    Full text link
    Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications are also increasing in their complexity and performance to cover most needs of their users. Both software and hardware design focused on increasing performance and the working hours of a mobile device. Different mobile operating systems are being used today with different platforms and different market shares. Like all information systems, mobile systems are prone to malware attacks. Due to the personality feature of mobile devices, malware detection is very important and is a must tool in each device to protect private data and mitigate attacks. In this paper, analysis of different malware detection techniques used for mobile operating systems is provides. The focus of the analysis will be on the to two competing mobile operating systems - Android and iOS. Finally, an assessment of each technique and a summary of its advantages and disadvantages is provided. The aim of the work is to establish a basis for developing a mobile malware detection tool based on user profiling.Comment: 11 pages, 6 figure

    Device-Centric Monitoring for Mobile Device Management

    Full text link
    The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices and operating systems is mostly application-centric, resulting in global, device-centric properties (e.g. the user may not send more than 100 messages per day across all applications) being difficult or impossible to verify. In this paper we present a device-centric approach to runtime verify the device behaviour against a device policy with the different applications acting as independent components contributing to the overall behaviour of the device. We also present an implementation for Android devices, and evaluate it on a number of device-centric policies, reporting the empirical results obtained.Comment: In Proceedings FESCA 2016, arXiv:1603.0837

    Bluetooth familiarity: methods of calculation, applications and limitations

    Get PDF
    We present an approach for utilising a mobile device’s Bluetooth sensor to automatically identify social interactions and relationships between individuals in the real world. We show that a high degree of accuracy is achievable in the automatic identification of mobile devices of familiar individuals. This has implications for mobile device security, social networking and in context aware information access on a mobile device

    Further Perspectives on Corporate Wrongdoing, In Pari Delicto, and Auditor Malpractice

    Get PDF
    In recent years, instant messaging (IM) has started to replace short message service (SMS) in communication. IM offers more functionality but there is a great downside. IM demands more power and drains the mobile device battery faster. This paper shows the energy consumption of  IM when the user is not using the application and how the consumption  can be reduced by enabling mobile sensors and sending fewer packets by the application. We began by investigating the various sensors that are supported by mobile devices. With the retrieved vendor information, we evaluated the different sensors and chose two sensors, light sensor and proximity sensor in order to study their use for reduction of energy in  an instant messaging scenario. These two sensors can together estimate if the mobile device is placed in the pocket of the user. The development of a simple IM application was completed and sensors were used to create an extension to the application. The extension would lengthen the interval between the updates of the automatic update function when the mobile was inactive, reducing the energy consumption. Two types of tests were performed. The first test evaluated if the extension would correctly deduce that the mobile device was placed inside a pocket. The mobile device with the pocket-aware application was used in different common situations and the tests showed that the extension made a correct computation in seven of nine situations. The faulty situations were when the mobile device is placed with the screen faced down to a surface. The second test compared the energy consumed by a pocket-aware application compared to a mobile device without our extension. Based on the results that we retrieved, we estimated that during a one minute period the pocket-aware application with an update interval of ten seconds could save on average 12% and could save on average 62% when the update interval was increased to fifteen seconds

    A Forensically Sound Adversary Model for Mobile Devices

    Full text link
    In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of forensic soundness. Our adversary model specifically considers and integrates the constraints of forensic soundness on the adversary, in our case, a forensic practitioner. One construction of the adversary model is an evidence collection and analysis methodology for Android devices. Using the methodology with six popular cloud apps, we were successful in extracting various information of forensic interest in both the external and internal storage of the mobile device

    Phishing Techniques in Mobile Devices

    Full text link
    The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to performing critical and sensitive tasks like money payments. Since the mobile device is accompanying a person most of his time, it is highly probably that it includes personal and sensitive data for that person. The increased use of mobile devices in daily life made mobile systems an excellent target for attacks. One of the most important attacks is phishing attack in which an attacker tries to get the credential of the victim and impersonate him. In this paper, analysis of different types of phishing attacks on mobile devices is provided. Mitigation techniques - anti-phishing techniques - are also analyzed. Assessment of each technique and a summary of its advantages and disadvantages is provided. At the end, important steps to guard against phishing attacks are provided. The aim of the work is to put phishing attacks on mobile systems in light, and to make people aware of these attacks and how to avoid themComment: 9 pages, two figure

    Reading with Mobile Phone & Large Display

    Get PDF
    In this paper we compare performance and usability between three different device combinations: a) mobile phone b) touch screen c) mobile phone & screen. We show that mobile phone & screen has a better perform-ance than phone only. We also discuss some interaction issues when using a mobile phone with a large screen
    corecore