Back
 JCC  Vol.2 No.12 , October 2014
An Overview of Mobile Malware and Solutions
Abstract: Mobile Security has been a rapidly growing field in the security area. With the increases of mobile devices and mobile applications, the need for mobile security has increased dramatically over the past several years. Many research and development projects on mobile security are ongoing in government, industry and academia. In this paper, we present an analysis of current mobile security problems and propose the possible solutions to malware threats. Our experiments show antimalware can protect mobile device from different types of mobile malware threats effectively.
Cite this paper: Wu, F. , Narang, H. and Clarke, D. (2014) An Overview of Mobile Malware and Solutions. Journal of Computer and Communications, 2, 8-17. doi: 10.4236/jcc.2014.212002.
References

[1]   (2009) Android, the World’s Most Popular Mobile Platform, 2009.
http://developer.android.com/about/index.html

[2]   Becher, M., et al. (2009) Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. http://www5.rz.rub.de:8032/imperia/md/content/wolf/ieee_mobile.pdf

[3]   Naumann, D. (2014) Mobile App Security Research.
http://research.stevens.edu/mobile-app-security

[4]   Dimensional Research (2012) The Impact Act of Mobile Devices Information Security: A Survey of It Professionals.
http://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report.pdf

[5]   Ian, P. (2012) Mobile Security Threats Rise. PC World.
http://www.pcworld.com/article/262017/mobile_security_threats_rise.html

[6]   TechTerms (2014) Malware.http://www.techterms.com/definition/malware

[7]   TechTerms (2014) Spyware. http://www.techterms.com/definition/spyware

[8]   Arsene, L. (2012) An Android Malware Analysis: DroidKungFu.
http://www.hotforsecurity.com/blog/an-android-malware-analysis-droidkungfu-4474.html.

[9]   Krause, K. (2011) DroidKungFu Malware Evolves to Avoid Detection.
http://phandroid.com/2011/07/01/droidkungfu-malware-evolves-to-avoid-detection/

[10]   Kindsight (2012) Malware Analysis Report.
http://www.kindsight.net/sites/default/files/Kindsight_Malware_Analysis-ZeroAcess-Botnet-final.pdf

[11]   Lookout (2011) Lookout Mobile Security Technical Tear Down.
https://blog.lookout.com/wp-content/uploads/2011/03/COMPLETE-DroidDream-Technical-Tear-Down_Lookout-Mobile-Security.pdf

 
 
Top