Hashing Smartphone Serial Numbers An ASLR Approach to Preventing Malware Attacks
نویسندگان
چکیده
The Internet and mobile devices today have merged seamlessly, giving smartphone users access to the World Wide Web, email and other network services and resources. Due to the increased popularity of smartphones they have become a very attractive target for malware. It is predicted that smartphone users will see a multitude of different malware attacks aimed at their mobile devices in the near future. This paper presents how malware can spread to smartphones, and possible routes to safeguard smartphones against attacks. Specific defensive tactics of the Symbian Operating System will be outlined and a variation of Address Space Layout Randomization (ASLR) specifically for smartphones will be presented to prevent the spread of malware from both the Internet and other smartphones.
منابع مشابه
Detecting Android Malware by Analyzing Manifest Files
The threat of Android malware has increased owing to the increasing popularity of smartphones. Once an Android smartphone is infected with malware, the user suffers from various damages, such as the theft of personal information stored in the smartphones, the unintentional sending of short messages to premium-rate numbers without the user’s knowledge, and the ability for the infected smartphone...
متن کاملA Survey on Security for Smartphone Device
The technological advancements in mobile connectivity services such as GPRS, GSM, 3G, 4G, Blue-tooth, WiMAX, and Wi-Fi made mobile phones a necessary component of our daily lives. Also, mobile phones have become smart which let the users perform routine tasks on the go. However, this rapid increase in technology and tremendous usage of the smartphones make them vulnerable to malware and other s...
متن کاملRandomizing Smartphone Malware Profiles against Statistical Mining Techniques
The growing use of smartphones opens up new opportunities for malware activities such as eavesdropping on phone calls, reading email and call-logs, and tracking callers’ locations. Statistical data mining techniques have been shown to be applicable to detect smartphone malware. In this paper, we demonstrate that statistical mining techniques are prone to attacks that lead to random smartphone m...
متن کاملA Survey on Malware Attacks on Smartphones
Today, smartphone has become a part of our everyday lives since they enable us to access variety of services in time . At present , the usage of these mobile services has significantly increased due to the different forms of connectivity provided by smartphones, such as GPRS, Bluetooth and Wi-Fi. At the same time , the number of vulnerabilities exploiting these services and communication channe...
متن کاملWave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture
Mobile devices, such as smartphones and tablets, offer a wide variety of important services to everyday users. Many of these services (such as NFC payments) are highly sensitive and can be abused by malicious entities, without the knowledge of the device user, in the form of insider attacks (such as malware) and/or outsider attacks (such as unauthorized reading and relay attacks). In this paper...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011