Poster: HoneyDroid - Creating a Smartphone Honeypot
نویسندگان
چکیده
Attacks against smartphones are becoming commonplace today, especially since they are connected to the Internet at all times. Current attacks range from worms and botnets [9], to user installed Trojans [8]. New vulnerabilities in smartphones emerge fast particularly since today’s smartphones are based on common software libraries such as the Linux kernel or the WebKit browser engine. In order to keep up with new attack trends we believe that it makes sense to adopt the honeypot scheme for smartphones. Honeypot: a computer system, built and deployed just for the goal of being attacked and compromised in order to study new attacks and to serve as an early warning system. In the past honeypots and honeynets (a network of honeypots) [10], [1], [5] have shown to efficiently detect scanning worms and attacks that exploit vulnerabilities.
منابع مشابه
SmartPot - Creating a 1 Generation Smartphone Honeypot
This paper discusses an experimental method for creating a 1 generation smart-phone honey-pot with the intention of discovering automated worms. A Honeyd low-interaction virtual honey-pot is conceived as a possible method of discovering automated smart-phone worms by emulating the operating system Windows Mobile 5 and Windows Mobile 6, along with the available TCP/UDP ports of each operating sy...
متن کاملNomadic Honeypots: A Novel Concept for Smartphone Honeypots
Intelligence on mobile threats is a valuable asset. Honeypots showed to provide a good resource to gain threat intelligence in other areas. Unfortunately, current malware largely relies on social engineering to infect smartphones. Recently, attacks against smartphones have shifted towards local communication interfaces. These trends make traditional honeypot concepts unsuitable. We propose a no...
متن کاملTowards Measuring the Effectiveness of Telephony Blacklists
The convergence of telephony with the Internet has led to numerous new attacks that make use of phone calls to defraud victims. In response to the increasing number of unwanted or fraudulent phone calls, a number of call blocking applications have appeared on smartphone app stores, including a recent update to the default Android phone app that alerts users of suspected spam calls. However, lit...
متن کاملBuilding a Honeypot to Research Cyber-Attack Techniques Interim report
The internet can be a dark and dangerous place; featuring viruses and cyber attacks. This project aims to uncover some of these threats and reveal just how vulnerable the internet can be. The project involves creating a honeypot a device designed to attract cyber attackers and to analyse cyber attacks to see what’s going on in the dark underworld of the internet. This interim report introduces ...
متن کاملPOSTER: Passwords on Flexible Display Devices
Flexible display devices allow users to interact with the device by deforming the surface of the display to trigger a command. When these devices become mainstream, for example as smart phones, e-readers, or tablets, they will require a means of authenticating legitimate users. In this poster, we present an authentication scheme for flexible display devices, its implementation on a flexible dis...
متن کامل