Skip to main content

Malware Detection in Ubiquitous Environments

  • Chapter
  • First Online:
ISSE 2012 Securing Electronic Business Processes

Abstract

Today, almost every environment (e.g. airports, home, office, etc.) are populated with a high number of heterogeneous devices like smart-phones, sensors, laptops, tablets or hotspots. Taking advantage of the different communications capabilities that these devices have, researches have been studying how to make people collaborate in spontaneous or dynamic groups to sharing photos, discuss topics, among others. However, this plethora of devices sharing “something” opens the doors to new potential threats putting in risk important personal data or misuse of device resources. Therefore, these environments require new mechanisms able to ensure that devices are conducted safely, and that are able to detect and inform about any anomalies that might occur during an interaction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

Literature

  1. Leavitt, N. “Mobile phones: the next frontier for hackers?” Computer, 38(4). pp. 20-23, 2005

    Article  Google Scholar 

  2. Luk Chi-Keung, Cohn Robert, Muth Robert, Patil Harish, Klauser Artur, Lowney Geoff, Wallace Steven, Janapa Reddi Vijay, and Hazelwood Kim. Pin: building customized program analysis tools with dynamic instrumentation. In Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation (PLDI ‘05). 190-200, 2005

    Google Scholar 

  3. Seward Julian, “Valgrind on Android-Current status”.http://blog.mozilla.org/jseward/2011/09/ 27/valgrind-on-android-current-status/. Last accessed: 2011

  4. Sverdlove Harry, “The Most Vulnerable Smartphones of 2011”,BIT9 Report, 2011

    Google Scholar 

  5. Valdes Alfonso and Cheung Steven, “Communication Pattern Anomaly Detection in Process Control Systems”, 2009 IEEE International Conference on Technologies for Homeland Security, 2009

    Google Scholar 

  6. Cheung S., Dutertre B., Fong M., Lindqvist U., Skinner k., and Valdes A., “Using Model-based Intrusion Detection for SCADA Networks”, Proceedings of the SCADA Security Scientific Symposium, D. Peterson, ed., 2007

    Google Scholar 

  7. Schultz, E.E. “Where have the worms and viruses gone? new trends in malware” Computer Fraud and Security, pp. 4-8, 2006

    Google Scholar 

  8. Burguera Iker, Zurutuza Urko, and Nadjm-Tehrani Simin, “Crowdroid: behavior-based malware detection system for Android”, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (SPSM ‘11) (Colocated with ACM Conference on Computer Security - CCS). ACM, New York, NY, USA, 15-26, 2011

    Google Scholar 

  9. Shabtai A., Moskovitch R., Feher C., Dolev S., Elovici Y., “Detecting Unknown Malicious Code by Applying Classification Techniques on OPCODEs Representation”, Security Informatics, 2012

    Google Scholar 

  10. Ryder, B.G., “Constructing the Call Graph of a Program,” Software Engineering, IEEE Transactions on, vol. SE-5, no.3 216- 226, 1979

    Google Scholar 

  11. Nethercote Nicholas and Seward Julian, “Valgrind: a framework for heavyweight dynamic binary instrumentation”, in Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation 89-100, 2007

    Google Scholar 

  12. Dhawal Desai, “Malware Analysis: ZitMo Trojan for AndroidOS”, Kindsight Report, 2011

    Google Scholar 

  13. Luk C.-K., Cohn R., R. Muth, Patil H., Klauser A., Lowney G., Wallace S., Reddi J., Hazelwood K., “Pin: building customized program analysis tools with dynamic instrumentation,” in Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, PLDI ’05, (New York, NY, USA), pp. 190–200, ACM, 2005

    Google Scholar 

  14. Falliere Nicolas, Murchu Liam O, Chien Eric “W32.Stuxnet Dossier”, Symantec Report, 2011

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manuel García-Cervigón .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

García-Cervigón, M., Morales, R. (2012). Malware Detection in Ubiquitous Environments. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-00333-3_17

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-00332-6

  • Online ISBN: 978-3-658-00333-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics