Abstract
Phones with some of the capabilities of modern computers also have the same kind of drawbacks. These phones are commonly referred to as smartphones. They have both phone and personal digital assistant (PDA) functionality. Typical to these devices is to have a wide selection of different connectivity options from general packet radio service (GPRS) data transfer to multi media messages (MMS) and wireless local area network (WLAN) capabilities. They also have standardized operating systems, which makes smartphones a viable platform for malware writers. Since the design of the operating systems is recent, many common security holes and vulnerabilities have been taken into account during the design. However, these precautions have not fully protected these devices. Even now, when smartphones are not that common, there is a handful of viruses for them. In this paper we will discuss some of the most typical viruses in the mobile environment and propose guidelines and predictions for the future.
Similar content being viewed by others
References
Vaughan-Nichols, S. J.: OSs Battle in the Smart-Phone Market. IEEE Comput. Soc. 36(6), 10–12, ISSN: 0018-9162 (2003)
ZdNet Research: IDC: smartphone OS market shares. http://www.itfacts.biz/index.php?id=P323 (29.6.2006) (2003)
Ziff Davis Media Inc.: Linux trails Windows, Symbian in converged mobile devices. http://linuxdevices.com/news/NS4058662049.html (29.6.2006) (2005)
Wong, F.-L., Stajano, F., Clulow, J.: Repairing the Bluetooth pairing protocol. (2005)
Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. http:// www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/index.html (29.6.2006) (2005)
F-Secure: CardTrap. http://www.f-secure.com/v-descs/card- trap\_a.shtml (20.6.2006) (2006)
Finnish Communications Regulatory Authority: Be Careful When Installing Programs. http://www.ficora.fi/mobiiliturva/english/8.html (20.6.2006) (2006)
F-Secure: Commwarrior.A. http://www.f-secure.com/v-descs/commwarrior.shtml (28.3.2005) (2005)
F-Secure: Lasco.A. http://www.f-secure.com/v-descs/lasco\_a.shtml (28.3.2005) (2005)
Symentec: Palm.Phage.Dropper. http://securityresponse.symantec.com/avcenter/venc/data/palm.phage.dropper.html (28.3.2005) (2005)
Airscanner Corp.: Airscanner Mobile Antivirus for Windows Mobile Smartphone. http://airscanner.com/downloads/smartphone/smav.html (28.3.2005) (2003)
Kaspersky Lab: Kaspersky Anti-Virus Mobile. http://www.kaspersky.com/ beta?product=159494805 (28.3.2005) (2005)
F-Secure: Mabir.A. http://www.f-secure.com/v-descs/mabir.shtml (13.4.2005) (2005)
EICAR: The Anti-Virus test file. http://www.eicar.org/ anti\_virus\_test\_file.htm (25.4.2005) (2003)
F-Secure: F-Secure Mobile Anti-Virus. http://www.f-secure.co.uk/products/fsmav.html (11.6.2006) (2006)
Sanomat, H.: Helsingin Sanomat. http://www.helsingin-sanomat.fi/ (28.6.2006) (2006)
Valtovaara M. (2005) Kannykkaan tullut multimediaviesti aiheutti isot kulut. Helsingin Sanomat. 22, A8
Niemelä, J.: What Makes Symbian Malware Tick. In: Proceedings of the 15th Virus Bulletin Conference. Virus Bulletin Ltd., England. pp. 314–322 (2005)
Mickens, J.W., Noble, B.D.: Modeling epidemic spreading in mobile environments (2005)
Kephart, J., White, S.: Directed-graph epidemiological models of computer viruses. In: Proceedings of the IEEE Computer Symposium on Research in Security and Privacy, pp. 343–359. May 1991
F-Secure: RedBrowser. http://www.f-secure.com/v-descs/red- browser\_a.shtml (20.6.2006) (2006)
Nokia: Series 60 Platform 3rd Edition: What’s New for Developers. http://sw.nokia.com/id/738fd4e2-aa2b-4722-b3b9-25ed7b6858f5/S60\_3rd\_Edition\_What’s\_New\_for\_Developers\_v1\_ 3_en. pdf (20.6.2006) (2005)
F-Secure: FlexiSpy. http://www.f-secure.com/v-descs/flexis- py\_a.shtml (20.6.2006) (2006)
FlexiSpy: FlexiSpy - Spy Software for mobile cell phones. Protect your children, catch cheating spouses!. http://www.flexispy.com/index.html (20.6.2006) (2006)
F-Secure: Skulls.D. http://www.f-secure.com/v-descs/skulls \_d.shtml (20.6.2006) (2006)
Will, S.: Smartphone virus hype dismissed. http://news.zdnet.co.uk/hardware/mobile/0,39020360,39197468,00.htm (7.3.2006) (2005)
Matt, H.: Smartphone users ‘aware of the growing threat’. http://news.zdnet.co.uk/hardware/mobile/0,39020360,39196753,00.htm (7.3.2006) (2005)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Töyssy, S., Helenius, M. About malicious software in smartphones. J Comput Virol 2, 109–119 (2006). https://doi.org/10.1007/s11416-006-0022-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-006-0022-0