31st October 2006 Mobile Worms and Introduction – “Mobile” : pertaining to mobile devices • cell phones, smart phones, PDAs, .... 31st October 2006 Mobile Worms and Viruses Differences w
Trang 1Mobile Viruses and Worms
(Project Group 6)
Amit Kumar Jain Amogh Asgekar Jeevan Chalke Manoj Kumar Ramdas Rao
Trang 231st October 2006 Mobile Worms and
Trang 3Introduction
Trang 431st October 2006 Mobile Worms and
Introduction
– “Mobile” : pertaining to mobile devices
• cell phones, smart phones, PDAs,
– All kinds of unwanted malicious software
Trang 531st October 2006 Mobile Worms and
Viruses
Differences with PC
differences exist:
− Lesser users of mobiles are less “tech literate”
− Implies that it is difficult to “rollout security
patches” to phones already sold
− Mobiles are always “connected” and switched on
− “Environment” keeps changing
Imagine one infected phone in a stadium full of people
Trang 631st October 2006 Mobile Worms and
Differences
− Several variants of phones exist
A malware for one type of phone may not necessarily be able to infect others
− E.g., A virus that uses an MMS exploit cannot infect a phone that does not have that facility at all
− Mobile malware not yet causing critical harm
At most
− they increase the user's billing, or
− cause the mobile phone to stop working (can be restored
by a factory reset)
Trang 7Classification of Mobile Worms and Viruses
Trang 831st October 2006 Mobile Worms and
Trang 931st October 2006 Mobile Worms and
Trang 1031st October 2006 Mobile Worms and
Mobile Virus Families
The increase of known mobile malware variants
Increases in known mobile malware families
Complete (as of 30th August 2006) list of mobile virus families according to Kaspersky Lab classification http://www.viruslist.com/en/analysis?pubid=200119916
Trang 1131st October 2006 Mobile Worms and
Viruses
Current threats by mobile malware
Send and sell private information
information on the phone
Trang 12Case Studies
Trang 1331st October 2006 Mobile Worms and
Viruses
Case Study – CABIR
Trang 1431st October 2006 Mobile Worms and
Case Study - ComWar
by charging the mobile user
Trang 1531st October 2006 Mobile Worms and
Viruses
Case Study - CardTrap
as well as Windows worm
legitimate applications – Black Symbian and Camcorder Pro
Trang 16Futuristic Threats
Trang 1731st October 2006 Mobile Worms and
Viruses
Futuristic Developments
Trang 18Protective Measures
Trang 1931st October 2006 Mobile Worms and
Viruses
Securing against attacks
Proactive approach
Trang 2031st October 2006 Mobile Worms and
Trang 2131st October 2006 Mobile Worms and
• Provides crypto functions and meets
performance and power targets
• Provides protection to any sensitive data
or cryptographic keys against common
attacks
Trang 2231st October 2006 Mobile Worms and
Proactive Approach
Trang 2331st October 2006 Mobile Worms and
Trang 2431st October 2006 Mobile Worms and
Questions???
Trang 2531st October 2006 Mobile Worms and
– Haataja, K., “Two practical attacks against Bluetooth security using new enhanced
implementations of security analysis tools”, CNIS 2005, Arizona, USA, November 14-16, 2005.
– http://www.thebunker.net/security/bluetooth.htm
– http://www.darknet.org.uk/2006/02/locate-anyone-in-the-uk-via-sms/
Protective Measures:
– MOSES: http://www.princeton.edu/ ∼ sravi/security.htm
– Bose, Shin, “Proactive Security for Mobile Messaging Networks”, WiSe '06, September 29,
2006.
Trang 26Thank You