Abstract:
As mobile computing devices become more widely used and integrated with more crucial systems like infrastructure and military or law enforcement, it becomes more apparent...Show MoreMetadata
Abstract:
As mobile computing devices become more widely used and integrated with more crucial systems like infrastructure and military or law enforcement, it becomes more apparent that these mobile systems should be the target of malware and other forms of cyber-attack. Limited system resources make classic signature detection difficult. As new methods for detection develop, it is important that we maintain the ability to confidently block harmful applications from running. We look at using default system resources to maintain control of application installation and execution. The confirmation and proper detection of malicious activity still requires offrite connectivity; however, without this connectivity, the default mobile resources can still be used to maintain control of a clean system environment until verification is made. Though the entire malware detection system is not demonstrated here, the proof of a gateway protocol for system modification and the layout of a supposed system are presented.
Published in: Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)
Date of Conference: 13-15 August 2014
Date Added to IEEE Xplore: 02 March 2015
Electronic ISBN:978-1-4799-5880-1