DocumentCode :
3570850
Title :
Deploying malware detection software for smart phones
Author :
McDaniel, Nathan ; Thuraisingham, Bhavani ; Khan, Latifur
Author_Institution :
Univ. of Texas at Dallas, Dallas, TX, USA
fYear :
2014
Firstpage :
24
Lastpage :
27
Abstract :
As mobile computing devices become more widely used and integrated with more crucial systems like infrastructure and military or law enforcement, it becomes more apparent that these mobile systems should be the target of malware and other forms of cyber-attack. Limited system resources make classic signature detection difficult. As new methods for detection develop, it is important that we maintain the ability to confidently block harmful applications from running. We look at using default system resources to maintain control of application installation and execution. The confirmation and proper detection of malicious activity still requires offrite connectivity; however, without this connectivity, the default mobile resources can still be used to maintain control of a clean system environment until verification is made. Though the entire malware detection system is not demonstrated here, the proof of a gateway protocol for system modification and the layout of a supposed system are presented.
Keywords :
invasive software; mobile computing; protocols; smart phones; cyber-attack; default system resource; gateway protocol; malware detection software; mobile computing device; smart phone; system layout; system modification; Androids; Feature extraction; Humanoid robots; Malware; Mobile communication; Mobile handsets; Testing; malware detection; mobile device;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on
Type :
conf
DOI :
10.1109/IRI.2014.7051867
Filename :
7051867
Link To Document :
بازگشت