A Survey on Malware Containment Models in Smartphones
2012; Trans Tech Publications; Volume: 263-266; Linguagem: Inglês
10.4028/www.scientific.net/amm.263-266.3005
ISSN2297-8941
Autores Tópico(s)Opportunistic and Delay-Tolerant Networks
ResumoSmartphones providing services like SMS/MMS, emails, online banking, and other applications, are becoming an integral part of our everyday lives. However, the availability of these services and applications provided by smartphones makes them a target for malicious attackers to propagate malware and perform other malicious attacks. To restrain malware propagation, the research advancement of malware containment is summarized in this paper. We provide an overview on malware, which includes the evolution of mobile malware, related concept, infection vectors, and risks. The typical malware containment models are selected to discuss in detail. At last, the current problems and challenges in this field for future work are proposed. This paper indicates that diversity and complexity of mobile malware pose great challenges in modeling malware containment.
Referência(s)