Advertisement

Journal in Computer Virology

, Volume 2, Issue 2, pp 109–119 | Cite as

About malicious software in smartphones

  • Sampo Töyssy
  • Marko Helenius
Original Paper

Abstract

Phones with some of the capabilities of modern computers also have the same kind of drawbacks. These phones are commonly referred to as smartphones. They have both phone and personal digital assistant (PDA) functionality. Typical to these devices is to have a wide selection of different connectivity options from general packet radio service (GPRS) data transfer to multi media messages (MMS) and wireless local area network (WLAN) capabilities. They also have standardized operating systems, which makes smartphones a viable platform for malware writers. Since the design of the operating systems is recent, many common security holes and vulnerabilities have been taken into account during the design. However, these precautions have not fully protected these devices. Even now, when smartphones are not that common, there is a handful of viruses for them. In this paper we will discuss some of the most typical viruses in the mobile environment and propose guidelines and predictions for the future.

Keywords

Mobile Phone Wireless Local Area Network General Packet Radio Service Multimedia Messaging Service Malicious Software 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Vaughan-Nichols, S. J.: OSs Battle in the Smart-Phone Market. IEEE Comput. Soc. 36(6), 10–12, ISSN: 0018-9162 (2003)Google Scholar
  2. 2.
    ZdNet Research: IDC: smartphone OS market shares. http://www.itfacts.biz/index.php?id=P323 (29.6.2006) (2003)Google Scholar
  3. 3.
    Ziff Davis Media Inc.: Linux trails Windows, Symbian in converged mobile devices. http://linuxdevices.com/news/NS4058662049.html (29.6.2006) (2005)Google Scholar
  4. 4.
    Wong, F.-L., Stajano, F., Clulow, J.: Repairing the Bluetooth pairing protocol. (2005)Google Scholar
  5. 5.
    Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. http:// www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/index.html (29.6.2006) (2005)Google Scholar
  6. 6.
    F-Secure: CardTrap. http://www.f-secure.com/v-descs/card- trap\_a.shtml (20.6.2006) (2006)Google Scholar
  7. 7.
    Finnish Communications Regulatory Authority: Be Careful When Installing Programs. http://www.ficora.fi/mobiiliturva/english/8.html (20.6.2006) (2006)Google Scholar
  8. 8.
    F-Secure: Commwarrior.A. http://www.f-secure.com/v-descs/commwarrior.shtml (28.3.2005) (2005)Google Scholar
  9. 9.
    F-Secure: Lasco.A. http://www.f-secure.com/v-descs/lasco\_a.shtml (28.3.2005) (2005)Google Scholar
  10. 10.
    Symentec: Palm.Phage.Dropper. http://securityresponse.symantec.com/avcenter/venc/data/palm.phage.dropper.html (28.3.2005) (2005)Google Scholar
  11. 11.
    Airscanner Corp.: Airscanner Mobile Antivirus for Windows Mobile Smartphone. http://airscanner.com/downloads/smartphone/smav.html (28.3.2005) (2003)Google Scholar
  12. 12.
    Kaspersky Lab: Kaspersky Anti-Virus Mobile. http://www.kaspersky.com/ beta?product=159494805 (28.3.2005) (2005)Google Scholar
  13. 13.
    F-Secure: Mabir.A. http://www.f-secure.com/v-descs/mabir.shtml (13.4.2005) (2005)Google Scholar
  14. 14.
    EICAR: The Anti-Virus test file. http://www.eicar.org/ anti\_virus\_test\_file.htm (25.4.2005) (2003)Google Scholar
  15. 15.
    F-Secure: F-Secure Mobile Anti-Virus. http://www.f-secure.co.uk/products/fsmav.html (11.6.2006) (2006)Google Scholar
  16. 16.
    Sanomat, H.: Helsingin Sanomat. http://www.helsingin-sanomat.fi/ (28.6.2006) (2006)Google Scholar
  17. 17.
    Valtovaara M. (2005) Kannykkaan tullut multimediaviesti aiheutti isot kulut. Helsingin Sanomat. 22, A8Google Scholar
  18. 18.
    Niemelä, J.: What Makes Symbian Malware Tick. In: Proceedings of the 15th Virus Bulletin Conference. Virus Bulletin Ltd., England. pp. 314–322 (2005)Google Scholar
  19. 19.
    Mickens, J.W., Noble, B.D.: Modeling epidemic spreading in mobile environments (2005)Google Scholar
  20. 20.
    Kephart, J., White, S.: Directed-graph epidemiological models of computer viruses. In: Proceedings of the IEEE Computer Symposium on Research in Security and Privacy, pp. 343–359. May 1991Google Scholar
  21. 21.
    F-Secure: RedBrowser. http://www.f-secure.com/v-descs/red- browser\_a.shtml (20.6.2006) (2006)Google Scholar
  22. 22.
    Nokia: Series 60 Platform 3rd Edition: What’s New for Developers. http://sw.nokia.com/id/738fd4e2-aa2b-4722-b3b9-25ed7b6858f5/S60\_3rd\_Edition\_What’s\_New\_for\_Developers\_v1\_ 3_en. pdf (20.6.2006) (2005)Google Scholar
  23. 23.
    F-Secure: FlexiSpy. http://www.f-secure.com/v-descs/flexis- py\_a.shtml (20.6.2006) (2006)Google Scholar
  24. 24.
    FlexiSpy: FlexiSpy - Spy Software for mobile cell phones. Protect your children, catch cheating spouses!. http://www.flexispy.com/index.html (20.6.2006) (2006)Google Scholar
  25. 25.
    F-Secure: Skulls.D. http://www.f-secure.com/v-descs/skulls \_d.shtml (20.6.2006) (2006)Google Scholar
  26. 26.
    Will, S.: Smartphone virus hype dismissed. http://news.zdnet.co.uk/hardware/mobile/0,39020360,39197468,00.htm (7.3.2006) (2005)Google Scholar
  27. 27.
    Matt, H.: Smartphone users ‘aware of the growing threat’. http://news.zdnet.co.uk/hardware/mobile/0,39020360,39196753,00.htm (7.3.2006) (2005)Google Scholar

Copyright information

© Springer-Verlag France 2006

Authors and Affiliations

  1. 1.10tons LtdTampereFinland
  2. 2.Department of Computer Sciences, Virus Research UnitUniversity of TampereTampereFinland

Personalised recommendations