414 Hits in 4.5 sec

Mobile Malware and Smart Device Security: Trends, Challenges and Solutions

Abdullahi Arabo, Bernardi Pranggono
2013 2013 19th International Conference on Control Systems and Computer Science  
We identified mobile malware as one of the main issue in the smart devices' security.  ...  Then we propose and discuss an integrated security solution for cyber security in smart devices to tackle the issue.  ...  Botnets are slowly moving towards smart devices since those devices are now basically everywhere, powerful enough to run a bot and offer additional gains for a bot-master such as financial gains as discussed  ... 
doi:10.1109/cscs.2013.27 dblp:conf/cscs/AraboP13 fatcat:j4e7fxcesnfblpp24dx4a6v5li

Evolution, Detection and Analysis of Malware for Smart Devices

Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, Arturo Ribagorda
2014 IEEE Communications Surveys and Tutorials  
Smart devices equipped with powerful sensing, computing and networking capabilities have proliferated lately, ranging from popular smartphones and tablets to Internet appliances, smart TVs, and others  ...  This article examines the problem of malware in smart devices and recent progress made in detection techniques.  ...  ACKNOWLEDGEMENTS We thank the anonymous reviewers for valuable suggestions that helped to improve the quality and organization of this paper.  ... 
doi:10.1109/surv.2013.101613.00077 fatcat:u7qjrw4grvcorjjmy3ykddjeda

A Review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices

Jameel Qadri, Thomas M. Chen, Jorge Blasco
2016 International Journal on Cyber Situational Awareness  
Malware is one of the serious threats posed to smartphones by the attackers. Due to the limited resources of mobile devices malware detection on these devices remains a challenge.  ...  Malware detection techniques based on energy-consumption anomaly present several advantages to circumvent the resource constraints of mobile devices.  ...  Al Housani et al. (2012) proposed a smart anti-malware that can shift between different security levels according to the assets value and the battery status of the resource-constrained device.  ... 
doi:10.22619/ijcsa.2016.1001010 fatcat:i3fjq66najeehbv5infkegzl5m

Ransomware protection in IoT using software defined networking

Azka Wani, S. Revathi
2020 International Journal of Electrical and Computer Engineering (IJECE)  
The negligence towards the IoT ransomware can result in disastrous outcomes.  ...  The IoT is also vulnerable to many cyber threats, owing to its limited resources and battery operation.  ...  ACKNOWLEDGEMENTS The authors are grateful to MANF UGC, Govt. of India for providing financial support under MANF-UGC (MANF-2015-17-JAM-60506) programme to carry out this work.  ... 
doi:10.11591/ijece.v10i3.pp3166-3175 fatcat:o7qadmiifjfmlclmgda7ibiyda

Anatomy of Threats to The Internet of Things

Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Ren Ping Liu, Wei Ni
2018 IEEE Communications Surveys and Tutorials  
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of smart devices.  ...  However, at the same time, numerous threats to the availability and privacy of the user data, message and device integrity, the vulnerability of IoT devices to malware attacks and the risk of physical  ...  Secure reboot of RT-IoT devices To recover from malware that resides in the RAM [176] automation such as power plants, intelligent traffic control system, railways, smart grids, and smart cities.  ... 
doi:10.1109/comst.2018.2874978 fatcat:5qkflaozurb4nctkfrwswnbce4

Features for Detecting Malware on Computing Environments

Ajit Kumar, K.S. Kuppusamy, G. Aghila
2016 International Journal of Engineering and Applied Computer Science  
Malware is the main threat for all computing environments. It also acts as launching platform for many other cyber threats.  ...  Various types of features are extracted and being researched with machine learning approach to detect malware that are targeted towards computing environments.  ...  devices and limited with small battery.  ... 
doi:10.24032/ijeacs/0102/01 fatcat:xyn5ealf5nb4jgoybi6phf7otq

Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models [chapter]

Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez
2014 Lecture Notes in Computer Science  
Malware for current smartphone platforms is becoming increasingly sophisticated.  ...  Our results show that the properties of these models follow a power-law distribution: a fact that facilitates an efficient generation of automatic testing patterns tailored for individual users, when done  ...  Acknowledgment We are very grateful to the anonymous reviewers for constructive feedback and insightful suggestions that helped to improve the quality of the original manuscript. The work of G.  ... 
doi:10.1007/978-3-319-11203-9_11 fatcat:na7wxu2lznfm3odsrz7wc3wpyq

Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software [chapter]

Iasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, Sotiris Ioannidis
2015 Lecture Notes in Computer Science  
We then translate our findings into a set of design guidelines for reducing the energy footprint of modern AVs for mobile devices.  ...  Modern smartphones, with their plethora of application scenarios and usage habits, are setting new challenges and constraints for malware detection software.  ...  The popularity of external power banks and slim batteries camouflaged as covers are a sign that smartphone users do need extra power for their devices.  ... 
doi:10.1007/978-3-319-20550-2_9 fatcat:la2ammv2orc45ijfhkqz3z7nnq

Challenges in securing the interface between the cloud and pervasive systems

Brent Lagesse
2011 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices  ...  In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what  ...  license to publish or reproduce the published form of this submission, or allow others to do so, for United States Government purposes.  ... 
doi:10.1109/percomw.2011.5766850 dblp:conf/percom/Lagesse11 fatcat:ddpfapbtkrdofg2crx2377js64

A Security Perspective on Battery Systems of the Internet of Things

Anthony Bahadir Lopez, Korosh Vatanparvar, Atul Prasad Deb Nath, Shuo Yang, Swarup Bhunia, Mohammad Abdullah Al Faruque
2017 Journal of Hardware and Systems Security  
A security analysis is necessary for system manufacturers and users to understand what threats and solutions exist for battery system security.  ...  We divide the battery system into the Physical, Battery Management System, and Application layers and use mobile systems and cyber-physical systems as case studies for IoT applications.  ...  The battery cells have certain limits (lower and upper voltage/current bounds) and demonstrate specific behavior towards different power requests.  ... 
doi:10.1007/s41635-017-0007-0 dblp:journals/jhss/LopezVNYBF17 fatcat:5d3jv5eirndihhhlwihubqhzxe

Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies

Moses Ashawa, Sarah Morris
2021 Journal of Information Security and Cybercrimes Research  
The paper presents mobile malware types and in-depth infection strategies malware deploys to infect mobile devices.  ...  Finally, we identify the need for a critical analysis of mobile malware frameworks to identify their weaknesses and strengths to develop a more robust, accurate, and scalable tool from an Android detection  ...  The study by Chen et al [38] asserted that malware infections and threats on mobile devices are increasingly spreading to affect other smart devices such as smart cities, smart TVs, smartwatches, cloud-based  ... 
doi:10.26735/krvi8434 fatcat:ukj62xubvzgdhf42fzgglv4zea

Energy Harvesting towards Self-Powered IoT Devices

Hassan Elahi, Khushboo Munir, Marco Eugeni, Sofiane Atek, Paolo Gaudenzi
2020 Energies  
Thus, from a practical point of view, such devices are composed of power-efficient storage, scalable, and lightweight nodes needing power and batteries to operate.  ...  The internet of things (IoT) manages a large infrastructure of web-enabled smart devices, small devices that use embedded systems, such as processors, sensors, and communication hardware to collect, send  ...  exhaustion No Anti-malware No Intrusion detection system [159-166] DoS Jamming Interruption of service No Anti-jamming solutions Degradation of throughput [167-169] DoS Stealthy Collision Energy depletion  ... 
doi:10.3390/en13215528 fatcat:24i5qw75gnccpno7gcrx55mmeq

Demanding Requirement of Security for Wireless Mobile Devices: A Survey

K. Muthumanickam, E. Ilavarasan
2014 Research Journal of Applied Sciences Engineering and Technology  
Specifically Android Smartphone which can access the Internet may now signify an ultimate option for malware authors.  ...  So in this study, we present an organized and widespread overview of the research on the security elucidation for wireless portable devices.  ...  to its owner's location or can exploit power exhaustive in GPS or Bluetooth enabled mobile phones to drain the battery.  ... 
doi:10.19026/rjaset.8.1244 fatcat:hu2ehdgmgzharhi3fzpenmmf5e

Android Security: A Survey of Issues, Malware Penetration, and Defenses

Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan
2015 IEEE Communications Surveys and Tutorials  
STEALTH MALWARE TECHNIQUES Android works under the condition of low processing power and limited memory as well as battery availability.  ...  For example, anti-malware apps have limited scanning and/or monitoring capability for other apps or file-system in the device.  ... 
doi:10.1109/comst.2014.2386139 fatcat:dkweaqhfo5dtpnii7xpgui4pgu

Searching Grade Scheme and Malware Recognition Within Google Play Application

Karthika A
2019 International Journal of Scientific Research in Science and Technology  
To make out malware, preceding work has paying attention on app executable and acquiescence analysis. It will show that 75 percent of the acknowledged malware apps engage in hunt rank fraud.  ...  FairPlay achieves over 95 percent accuracy in classify gold regular datasets of malware, counterfeit and legitimate apps.  ...  ., anti-virtual contraption and anti-debugger) and thus malicious activities force not is hidden beginning detection.  ... 
doi:10.32628/ijsrst196177 fatcat:caivp56bkrealhcmc6isqrlkiy
« Previous Showing results 1 — 15 out of 414 results