Cross-Platform Malware Contamination
نویسنده
چکیده
منابع مشابه
Cross-platform Mobile Malware: Write Once, Run Everywhere
Every day, thousands of new mobile apps are published on mobile app stores including Google Play and iOS App Store. While many of them are native apps, others are cross-platform mobile apps or HTML-based hybrid apps developed using various cross-platform mobile development tools. Native apps for Android and iOS are usually written using Android SDK and XCode tools respectively, but malware auth...
متن کاملPOSTER: Cross-Platform Malware: Write Once, Infect Everywhere
In this ongoing work we perform the first systematic investigation of cross-platform (X-platform) malware. As a first step, this paper presents an exploration into existing X-platform malware families and X-platform vulnerabilities used to distribute them. Our exploration shows that Xplatform malware uses a wealth of methods to achieve portability. It also shows that exploits for X-platform vul...
متن کاملOver-the-Air Cross-platform Infection for Breaking mTAN-based Online Banking Authentication
We present a novel stealthy cross-platform infection attack in WiFi networks. Our attack has high impact on two-factor authentication schemes that make use of mobile phones. In particular, we apply our attack to break mTAN authentication, one of the most used scheme for online banking worldwide (Europe, US, China). We present the design and implementation of the online banking Trojan which spre...
متن کاملA Survey on Various Malware Detection Techniques on Mobile Platform
With the rapid arrival of mobile platforms on the market, android Platform has become a market leader in 2015 Q2, according to IDC. As Android has ruling most of the market, the problem of malware threats and security is also increasing. In this review paper, a fastidious study of the terms related to mobile malware and the techniques used for the detection of malware is done. Some proposed met...
متن کاملArchitecture of a Platform for Malware Analysis and Confinement
In this paper, we describe an architecture of a platform for studying botnets, finding adequate analysis methods, monitoring the activity of botnets, and finding efficient countermeasures or confinement methods. The platform is composed of a filtering and monitoring gateway, low and high interaction honeypots, and a system for malware analysis. We present all the elements, discuss their roles a...
متن کامل