Skip to main content

NEMESYS: First Year Project Experience in Telecom Italia Information Technology

  • Conference paper
  • First Online:
Book cover Information Sciences and Systems 2013

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 264))

Abstract

In 2011, when mobile malware quadrupled in volume, it became clear that malware for mobile platforms would experience a rapid increase. During 2012 it continued to grow steadily, closely following the spreading of smartphones all over the world. For mobile network operators it is also clear that this growing phenomenon must be at least constantly monitored, if not prevented altogether. At the present moment there are no effective tools to achieve this purpose. NEMESYS comes to fill in this vacuum. This paper presents the vision, position and activities of  Telecom Italia Information Technology as part of the NEMESYS project. The emphasis is given to the perception and practical experience of mobile threats and mobile security in Telecom Italia Mobile Network, and on the advances in the art that our company is hoping to achieve from its active participation to the project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. mobiThinking, Global mobile statistics 2012 Part A, http://mobithinking.com

  2. Strategy Analytics (2012) Android and Apple iOS capture a record 92 percent share of global Smartphone shipments in Q4 2012, http://blogs.strategyanalytics.com

  3. Technology Review, Are SmartPhones spreading faster than any technology in human history? http://www.technologyreview.com

  4. Gartner (2012) Market share: mobile devices, Worldwide. http://www.gartner.com/resId=2117915

  5. Insights Chitika (2012) Study six-month Apple iOS users consume growing amount of Web traffic

    Google Scholar 

  6. InfoWorld (2013) Android takes the lead from iOS in mobile data traffic. http://www.infoworld.com

  7. Trend Micro (2012) Mobile malware surged from 30K to 175K, Q3. http://www.trendmicro.com

  8. McAfee Threats Report (2012) Fourth quarter. http://www.mcafee.com

  9. Kaspersky Labs (2012) Kaspersky security bulletin 2012. The overall statistics for 2012. http://www.securelist.com/en/analysis/204792255

  10. Lookout Inc. US (2012) State of mobile security 2012. https://www.lookout.com/resources/reports/state-of-mobile-security-2012

  11. McAfee (2013) Mobile security: McAfee consumer trends report 2013. http://www.mcafee.com

  12. Gsma, SPAM Reporting Services. http://www.gsma.com/technicalprojects/gsma-spam-reporting-services

  13. Androguard, Reverse engineering, Malware and goodware analysis of Android applications. http://code.google.com/p/androguard/

  14. Android Permissions. http://developer.android.com

  15. Apvrille A, Strazzere T (2012) Reducing the window of opportunity for Android malware Gotta catch ’em all. J Comput Virol 8(1–2):61–71

    Article  Google Scholar 

  16. Jan Jantzen (2008) Tutorial on fuzzy Logic. Technical University of Denmark, Oersted-DTU, Automation, Bldg 326, 2800 Kongens Lyngby, DENMARK. Technical report no 98-E 868 (logic). Revised 17 June 2008

    Google Scholar 

  17. Contagio malware, Mobile malware mini dump. http://contagiominidump.blogspot.it/

  18. Mulliner C, Liebergeld S, Lange M (2011) Poster: HoneyDroid—creating a SmartPhone Honeypot. In: IEEE symposium on security and privacy, March

    Google Scholar 

  19. Portio Research Ltd. UK (2012) Mobile Factbook 2012. http://www.portioresearch.com

  20. ZDNet, iOS users generate twice as much web traffic than Android users. http://www.zdnet.com

  21. F-Secure Labs (2012) Mobile threat report Q3 2012. http://www.f-secure.com

  22. Droidbox. Android application Sandbox. http://code.google.com/p/droidbox/

Download references

Acknowledgments

The work presented in this paper is part of the Project NEMESYS (Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem) which has received funding from the European Union Seventh Framework Programme (FP7) under grant agreement 317888.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Madalina Baltatu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Baltatu, M., D’Alessandro, R., D’Amico, R. (2013). NEMESYS: First Year Project Experience in Telecom Italia Information Technology. In: Gelenbe, E., Lent, R. (eds) Information Sciences and Systems 2013. Lecture Notes in Electrical Engineering, vol 264. Springer, Cham. https://doi.org/10.1007/978-3-319-01604-7_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01604-7_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-01603-0

  • Online ISBN: 978-3-319-01604-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics