{"title":"On rootkit and malware detection in smartphones","authors":"Bryan Dixon, Shivakant Mishra","doi":"10.1109/DSNW.2010.5542600","DOIUrl":null,"url":null,"abstract":"Dramatic increase in smartphone sales and third-party applications that users can download has significantly increased the possibility of rootkits and malware targeted for smartphones. This paper discusses the current state of research in detection and mitigation of propagation of malicious code, such as viruses, malware and even rootkits in smartphones. A new strategy is introduced that offers a solution to efficiently detect the presence of rootkits and mal-ware in smartphones. A preliminary prototype based on this strategy has been built for the android dev phone. The paper discusses the design, implementation and preliminary performance of this prototype.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DSNW.2010.5542600","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20
Abstract
Dramatic increase in smartphone sales and third-party applications that users can download has significantly increased the possibility of rootkits and malware targeted for smartphones. This paper discusses the current state of research in detection and mitigation of propagation of malicious code, such as viruses, malware and even rootkits in smartphones. A new strategy is introduced that offers a solution to efficiently detect the presence of rootkits and mal-ware in smartphones. A preliminary prototype based on this strategy has been built for the android dev phone. The paper discusses the design, implementation and preliminary performance of this prototype.