Abstract
Today, almost every environment (e.g. airports, home, office, etc.) are populated with a high number of heterogeneous devices like smart-phones, sensors, laptops, tablets or hotspots. Taking advantage of the different communications capabilities that these devices have, researches have been studying how to make people collaborate in spontaneous or dynamic groups to sharing photos, discuss topics, among others. However, this plethora of devices sharing “something” opens the doors to new potential threats putting in risk important personal data or misuse of device resources. Therefore, these environments require new mechanisms able to ensure that devices are conducted safely, and that are able to detect and inform about any anomalies that might occur during an interaction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Literature
Leavitt, N. “Mobile phones: the next frontier for hackers?” Computer, 38(4). pp. 20-23, 2005
Luk Chi-Keung, Cohn Robert, Muth Robert, Patil Harish, Klauser Artur, Lowney Geoff, Wallace Steven, Janapa Reddi Vijay, and Hazelwood Kim. Pin: building customized program analysis tools with dynamic instrumentation. In Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation (PLDI ‘05). 190-200, 2005
Seward Julian, “Valgrind on Android-Current status”.http://blog.mozilla.org/jseward/2011/09/ 27/valgrind-on-android-current-status/. Last accessed: 2011
Sverdlove Harry, “The Most Vulnerable Smartphones of 2011”,BIT9 Report, 2011
Valdes Alfonso and Cheung Steven, “Communication Pattern Anomaly Detection in Process Control Systems”, 2009 IEEE International Conference on Technologies for Homeland Security, 2009
Cheung S., Dutertre B., Fong M., Lindqvist U., Skinner k., and Valdes A., “Using Model-based Intrusion Detection for SCADA Networks”, Proceedings of the SCADA Security Scientific Symposium, D. Peterson, ed., 2007
Schultz, E.E. “Where have the worms and viruses gone? new trends in malware” Computer Fraud and Security, pp. 4-8, 2006
Burguera Iker, Zurutuza Urko, and Nadjm-Tehrani Simin, “Crowdroid: behavior-based malware detection system for Android”, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (SPSM ‘11) (Colocated with ACM Conference on Computer Security - CCS). ACM, New York, NY, USA, 15-26, 2011
Shabtai A., Moskovitch R., Feher C., Dolev S., Elovici Y., “Detecting Unknown Malicious Code by Applying Classification Techniques on OPCODEs Representation”, Security Informatics, 2012
Ryder, B.G., “Constructing the Call Graph of a Program,” Software Engineering, IEEE Transactions on, vol. SE-5, no.3 216- 226, 1979
Nethercote Nicholas and Seward Julian, “Valgrind: a framework for heavyweight dynamic binary instrumentation”, in Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation 89-100, 2007
Dhawal Desai, “Malware Analysis: ZitMo Trojan for AndroidOS”, Kindsight Report, 2011
Luk C.-K., Cohn R., R. Muth, Patil H., Klauser A., Lowney G., Wallace S., Reddi J., Hazelwood K., “Pin: building customized program analysis tools with dynamic instrumentation,” in Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, PLDI ’05, (New York, NY, USA), pp. 190–200, ACM, 2005
Falliere Nicolas, Murchu Liam O, Chien Eric “W32.Stuxnet Dossier”, Symantec Report, 2011
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
García-Cervigón, M., Morales, R. (2012). Malware Detection in Ubiquitous Environments. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_17
Download citation
DOI: https://doi.org/10.1007/978-3-658-00333-3_17
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-00332-6
Online ISBN: 978-3-658-00333-3
eBook Packages: Computer ScienceComputer Science (R0)