Skip to main content

A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment

  • Conference paper
Book cover Communication and Networking (FGCN 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 119))

Abstract

Recently, the interest and demands for mobile communications are growing so fast because of the increasing prevalence of smartphones around the world. In addition, the existing feature phones were replaced by smartphones and it has widely improved while using the explosive growth of Internet users using smartphones, e-commerce enabled Internet banking transactions and the importance of protecting personal information.  Therefore, the development of smartphones antivirus products was developed and launched in order to prevent malicious code or virus infection. In this paper, we proposed a new scheme to protect the smartphone from malicious codes and malicious applications that are element of security threats in mobile environment and to prevent information leakage from malicious code infection. The proposed scheme is based on the white list smartphone application which only allows installing authorized applications and to prevent the installation of malicious and untrusted mobile applications which can possibly infect the applications and programs of smartphones.

This work was supported by the Security Engineering Research Center, granted by the Korea Ministry of Knowledge Economy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hypponen, M.: Malware goes Mobile.: Technical Report, INC (2006)

    Google Scholar 

  2. Gartner.: Worldwide Smartphone Sales to End Users in 2Q2009. (2009)

    Google Scholar 

  3. Kim, K.Y., Kang, D.H.: Smart Phone Security Technology in Opened Mobile Environment. Korea Institute of Information Security & Cryptology 19(5) (2009)

    Google Scholar 

  4. Mulliner, C.: Security of Smart Phones. Master Thesis (2006)

    Google Scholar 

  5. AhnLab, http://www.ahnlab.com/kr/site/securitycenter/securitycenterMain.do

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, K., Tolentino, R.S., Park, GC., Kim, YT. (2010). A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment. In: Kim, Th., Chang, A.CC., Li, M., Rong, C., Patrikakis, C.Z., Ślęzak, D. (eds) Communication and Networking. FGCN 2010. Communications in Computer and Information Science, vol 119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17587-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17587-9_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17586-2

  • Online ISBN: 978-3-642-17587-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics