POSTER: Cross-Platform Malware: Write Once, Infect Everywhere
نویسندگان
چکیده
In this ongoing work we perform the first systematic investigation of cross-platform (X-platform) malware. As a first step, this paper presents an exploration into existing X-platform malware families and X-platform vulnerabilities used to distribute them. Our exploration shows that Xplatform malware uses a wealth of methods to achieve portability. It also shows that exploits for X-platform vulnerabilities are X-platform indeed and readily available in commercial exploit kits, making them an inexpensive distribution vector for X-platform malware.
منابع مشابه
Cross-platform Mobile Malware: Write Once, Run Everywhere
Every day, thousands of new mobile apps are published on mobile app stores including Google Play and iOS App Store. While many of them are native apps, others are cross-platform mobile apps or HTML-based hybrid apps developed using various cross-platform mobile development tools. Native apps for Android and iOS are usually written using Android SDK and XCode tools respectively, but malware auth...
متن کاملAgent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e.g. worms) and related threats. Agents are not only used as a system-integration platform, but we use modern agent approaches to trust modeling and distributed task allocation to efficiently detect and also counter th...
متن کاملPoster: A general practitioner or a specialist for your infected smartphone?
With explosive growth in the number of mobile devices, the mobile malware is rapidly spreading as well, and the number of encountered malware families is increasing. Existing solutions, which are mainly based on one malware detector running on the phone or in the cloud, are no longer effective. Main problem lies in the fact that it might be impossible to create a unique mobile malware detector ...
متن کاملPoster: CompareView - A Provenance Verification Framework for Detecting Rootkit-Based Malware
Using rootkit mechanisms to hide malware presence is pervasive in today’s computer attacks. We propose the CompareView framework, a host-based solution to detect stealthy outbound traffic generated by rootkit-based malware. Using a lightweight cryptographic protocol, our CompareView framework compares the views of outbound network packets at different layers of the host network stack and verify...
متن کامل