Security of Mobile Phones: Prevention Methods for The Spread of Malware

被引:0
|
作者
Ghallali, Mohamed [1 ]
El Ouahidi, Bouabid [1 ]
机构
[1] Univ Mohammed V AGDAL, Fac Sci, Lab Data Min & Reseaux, Rabat, Morocco
来源
2012 6TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT) | 2012年
关键词
State of the art in mobile phone; security mobile phones; MMS infection; Bluetooth infection;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The work presented in this paper describes the evolution impact of mobile devices operating system's features through its increasing use for internet navigation. And thus, the growing risks of getting contaminated by hostile programs, which exploit the vulnerabilities of these systems and spreading to a large scale via services such as Bluetooth and MMS. Following the description of methods of infection and spread of these devices via Bluetooth and MMS, both solutions of the industry and academia are exposed. In addition, a solution based on the use of online services provider telecom is proposed at the end in order to guarantee an optimal security for private and professional data to all mobile phone users with a complete scan against all malicious programs: viruses, spams, and DOS attacks. (Abstract)
引用
收藏
页码:648 / 651
页数:4
相关论文
共 50 条
  • [1] Insights into Malware Detection and Prevention on Mobile Phones
    Yan, Qiang
    Li, Yingjiu
    Li, Tieyan
    Deng, Robert
    SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 242 - +
  • [2] On the Potential of Limitation-oriented Malware Detection and Prevention Techniques on Mobile Phones
    Yan, Qiang
    Deng, Robert H.
    Li, Yingjiu
    Li, Tieyan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2010, 4 (01): : 21 - 30
  • [3] METHODS FOR THE PREVENTION OF THE USE OF MOBILE PHONES IN CORRECTIONAL INSTITUTIONS
    Bisson, Sylvio
    Godbole, Pushkar E.
    McKee, Matthew
    St-Amand, Marc
    46TH ANNUAL 2012 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2012, : 237 - 245
  • [4] Defending Mobile Phones from Proximity Malware
    Zyba, Gjergji
    Voelker, Geoffrey M.
    Liljenstam, Michael
    Mehes, Andras
    Johansson, Per
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 1503 - +
  • [5] Bluetooth Security Analysis for Mobile Phones
    Alfaiate, Joao
    Fonseca, Jose
    SISTEMAS Y TECNOLOGIAS DE INFORMACION, VOLS 1 AND 2, 2012, : 169 - 174
  • [6] Mobile phones security using biometrics
    Shabeer, H. Abdul
    Suganthi, P.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 270 - +
  • [7] Bluetooth Security Analysis for Mobile Phones
    Alfaiate, Joao
    Fonseca, Jose
    7TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2012), 2012,
  • [8] Security of Mobile Phones and their Usage in Business
    Alqahtani, Abdullah Saleh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (11) : 17 - 32
  • [9] Issues with Various Security Threats on Mobile Phones
    Nseir, Sana
    Hirzallah, Nael
    Aqel, Musbah
    PROCEEDINGS OF THE 2013 PALESTINIAN INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (PICICT), 2013, : 37 - 42
  • [10] The potential role of mobile phones in the spread of bacterial infections
    Akinyemi, Kabir O.
    Atapu, Audu D.
    Adetona, Olabisi O.
    Coker, Akitoye O.
    JOURNAL OF INFECTION IN DEVELOPING COUNTRIES, 2009, 3 (08): : 628 - 632