skip to main content
10.1145/1741866.1741874acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

pBMDS: a behavior-based malware detection system for cellphone devices

Published:22 March 2010Publication History

ABSTRACT

Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware not only causes privacy leakage, extra charges, and depletion of battery power, but also generates malicious traffic and drains down mobile network and service capacity. In this work we devise a novel behavior-based malware detection system named pBMDS, which adopts a probabilistic approach through correlating user inputs with system calls to detect anomalous activities in cellphones. pBMDS observes unique behaviors of the mobile phone applications and the operating users on input and output constrained devices, and leverages a Hidden Markov Model (HMM) to learn application and user behaviors from two major aspects: process state transitions and user operational patterns. Built on these, pBDMS identifies behavioral differences between malware and human users. Through extensive experiments on major smartphone platforms, we show that pBMDS can be easily deployed to existing smartphone hardware and it achieves high detection accuracy and low false positive rates in protecting major applications in smartphones.

References

  1. http://en.wikipedia.org/wiki/cross_validation.Google ScholarGoogle Scholar
  2. http://trolltech.com/products/qtopia.Google ScholarGoogle Scholar
  3. http://trolltech.com/products/qtopia/qtopiainuse/qtopiadevices.Google ScholarGoogle Scholar
  4. http://www.elinux.org/osk.Google ScholarGoogle Scholar
  5. http://www.f-secure.com/v-descs/flexispy_a.shtml.Google ScholarGoogle Scholar
  6. http://www.us-cert.gov/press_room/trendsandanalysisq108.pdf.Google ScholarGoogle Scholar
  7. http://www.virtuallogix.com/.Google ScholarGoogle Scholar
  8. Mcafee mobile security report 2008, mcafee.com/us/research/mobile_security_report_2008.html.Google ScholarGoogle Scholar
  9. Mcafee mobile security report 2009, mcafee.com/us/local_content/reports/mobile_security_report_2009.pdf.Google ScholarGoogle Scholar
  10. Mobile device ui design, http://blueflavor.com/blog/2006/apr/04/mobile-device-ui-design/.Google ScholarGoogle Scholar
  11. OpenMoko. http://wiki.openmoko.org.Google ScholarGoogle Scholar
  12. TCG mobile reference architecture specification version 1.0. https://www.trustedcomputinggroup.org/specs/mobilephone.Google ScholarGoogle Scholar
  13. Virtualization for embedded systems, http://www.ok-labs.com/.Google ScholarGoogle Scholar
  14. A. Bose and et al. Behavioral detection of malware on mobile handsets. In Proc. of MobiSys, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Bose and K. Shin. Proactive security for mobile messaging networks. In Proc. of WiSe, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Chen, S. Wongand, H. Yang, and S. Lu. Smartsiren: Virus detection and alert for smartphones. In Proc. of MobiSys, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. E. Chien. Security response: Symbos.lasco.a, symantec, 2005.Google ScholarGoogle Scholar
  18. E. Chien. Security response: Symbos.mabir, symantec, 2005.Google ScholarGoogle Scholar
  19. E. Chien. Security response: Symbos.skull, symantec, 2004.Google ScholarGoogle Scholar
  20. P. Ferrie, P. Szor, R. Stanev, and R. Mouritzen. Security response: Symbos.cabir. Symantec Corporation, 2004.Google ScholarGoogle Scholar
  21. S. Forrest, S. Hofmeyr, A. Somayaji, and T. longstaff. A sense of self for unix processes. In Proc. of the IEEE Symposium in Security and Privacy, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Forrest and B. Pearlmutter. Detecting instructions using system calls: Alternative data models. In IEEE Symposium on Security and Privacy, 1999.Google ScholarGoogle Scholar
  23. C. Guo, H. Wang, and W. Zhu. Smartphone attacks and defenses. In HotNets-III, UCSD, Nov. 2004.Google ScholarGoogle Scholar
  24. C. Heath. Symbian os platform security. In Symbian Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. Hypponen. State of cell phone malware in 2007, http://www.usenix.org/events/sec07/tech/hypponen.pdf.Google ScholarGoogle Scholar
  26. A.K. Karlson and B.B. Bederson. One-handed touchscreen input for legacy applications. In Proc. of CHI, pages 1399--1408, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. E. Kirda and et al. Behavior-based spyware detection. In Proc of USENIX Security Symposium, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Lactaotao. Security information: Virus encyclopedia: Symbos_comwar.a: Technical details. Trend Micro Inc., 2005.Google ScholarGoogle Scholar
  29. W. Lee, S. Stolfo, and P. Chan. Learning patterns from unix process execution traces for intrustion detection. In Proc. of AAAI, 1997.Google ScholarGoogle Scholar
  30. C. Mulliner and G. Vigna. Vulnerability analysis of mms user agents. In Proc. of ACM ACSAC, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. C. Mulliner, G. Vigna, D. Dagon, and W. Lee. Using labeling to prevent cross-service attacks against smartphones. In DIMVA, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. D. Muthukumaran, A. Sawani, J. Schiffman, B.M. Jung, and T. Jaeger. Measuring integrity on mobile phone systems. In Proc. of the 13th ACM Symposium on Access Control Models and Technologies, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. L. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. In Proc. of the IEEE, 1989.Google ScholarGoogle Scholar
  34. R. Racic, D. Ma, and H. Chen. Exploiting mms vulnerabilities to stealthily exhause mobile phone's battery. In IEEE SecureComm, 2006.Google ScholarGoogle Scholar
  35. R. Sailer, X. Zhao, T. Jaeger, and L. Doom. Design and implementation of a tcg-based integrity measurement architecture. In Proc. of Usenix Security Symposium, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: Alternative data models. In IEEE Symposium in Security and Privacy, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  37. L. Welch. The shannon lecture: Hidden markov models and the baum-welch algorithm. In IEEE Information Theory Society Newsletter, 2003.Google ScholarGoogle Scholar
  38. A. Wespi, M. Dacier, and H. Debar. Intrusion detection using variable length audit trail patterns. In Proc. of RAID, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. L. Xie, H. Song, T. Jaeger, and S. Zhu. Towards a systematic approach for cell-phone worm containment. In Proc. of International World Wide Web Conference (WWW), poster, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. D. Yeung and Y. Ding. Host-based intrustion detection using dynamic and static behavioral models. In Pattern Recognition, Issue.1, 2003.Google ScholarGoogle Scholar
  41. X. Zhang, O. Aciicmez, and J. Seifert. A trusted mobile phone reference architecture via secure kernel. In ACM workshop on Scalable trusted computing, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. pBMDS: a behavior-based malware detection system for cellphone devices

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WiSec '10: Proceedings of the third ACM conference on Wireless network security
        March 2010
        186 pages
        ISBN:9781605589237
        DOI:10.1145/1741866

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 March 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate98of338submissions,29%

        Upcoming Conference

        WiSec '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader