Abstract
In 2011, when mobile malware quadrupled in volume, it became clear that malware for mobile platforms would experience a rapid increase. During 2012 it continued to grow steadily, closely following the spreading of smartphones all over the world. For mobile network operators it is also clear that this growing phenomenon must be at least constantly monitored, if not prevented altogether. At the present moment there are no effective tools to achieve this purpose. NEMESYS comes to fill in this vacuum. This paper presents the vision, position and activities of Telecom Italia Information Technology as part of the NEMESYS project. The emphasis is given to the perception and practical experience of mobile threats and mobile security in Telecom Italia Mobile Network, and on the advances in the art that our company is hoping to achieve from its active participation to the project.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
mobiThinking, Global mobile statistics 2012 Part A, http://mobithinking.com
Strategy Analytics (2012) Android and Apple iOS capture a record 92 percent share of global Smartphone shipments in Q4 2012, http://blogs.strategyanalytics.com
Technology Review, Are SmartPhones spreading faster than any technology in human history? http://www.technologyreview.com
Gartner (2012) Market share: mobile devices, Worldwide. http://www.gartner.com/resId=2117915
Insights Chitika (2012) Study six-month Apple iOS users consume growing amount of Web traffic
InfoWorld (2013) Android takes the lead from iOS in mobile data traffic. http://www.infoworld.com
Trend Micro (2012) Mobile malware surged from 30K to 175K, Q3. http://www.trendmicro.com
McAfee Threats Report (2012) Fourth quarter. http://www.mcafee.com
Kaspersky Labs (2012) Kaspersky security bulletin 2012. The overall statistics for 2012. http://www.securelist.com/en/analysis/204792255
Lookout Inc. US (2012) State of mobile security 2012. https://www.lookout.com/resources/reports/state-of-mobile-security-2012
McAfee (2013) Mobile security: McAfee consumer trends report 2013. http://www.mcafee.com
Gsma, SPAM Reporting Services. http://www.gsma.com/technicalprojects/gsma-spam-reporting-services
Androguard, Reverse engineering, Malware and goodware analysis of Android applications. http://code.google.com/p/androguard/
Android Permissions. http://developer.android.com
Apvrille A, Strazzere T (2012) Reducing the window of opportunity for Android malware Gotta catch ’em all. J Comput Virol 8(1–2):61–71
Jan Jantzen (2008) Tutorial on fuzzy Logic. Technical University of Denmark, Oersted-DTU, Automation, Bldg 326, 2800 Kongens Lyngby, DENMARK. Technical report no 98-E 868 (logic). Revised 17 June 2008
Contagio malware, Mobile malware mini dump. http://contagiominidump.blogspot.it/
Mulliner C, Liebergeld S, Lange M (2011) Poster: HoneyDroid—creating a SmartPhone Honeypot. In: IEEE symposium on security and privacy, March
Portio Research Ltd. UK (2012) Mobile Factbook 2012. http://www.portioresearch.com
ZDNet, iOS users generate twice as much web traffic than Android users. http://www.zdnet.com
F-Secure Labs (2012) Mobile threat report Q3 2012. http://www.f-secure.com
Droidbox. Android application Sandbox. http://code.google.com/p/droidbox/
Acknowledgments
The work presented in this paper is part of the Project NEMESYS (Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem) which has received funding from the European Union Seventh Framework Programme (FP7) under grant agreement 317888.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this paper
Cite this paper
Baltatu, M., D’Alessandro, R., D’Amico, R. (2013). NEMESYS: First Year Project Experience in Telecom Italia Information Technology. In: Gelenbe, E., Lent, R. (eds) Information Sciences and Systems 2013. Lecture Notes in Electrical Engineering, vol 264. Springer, Cham. https://doi.org/10.1007/978-3-319-01604-7_39
Download citation
DOI: https://doi.org/10.1007/978-3-319-01604-7_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01603-0
Online ISBN: 978-3-319-01604-7
eBook Packages: Computer ScienceComputer Science (R0)