skip to main content
10.1145/1247660.1247690acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
Article

SmartSiren: virus detection and alert for smartphones

Published:13 June 2007Publication History

ABSTRACT

Smartphones have recently become increasingly popular because they provide "all-in-one" convenience by integrating traditional mobile phones with handheld computing devices. However, the flexibility of running third-party softwares also leaves the smartphones open to malicious viruses. In fact, hundreds of smartphone viruses have emerged in the past two years, which can quickly spread through various means such as SMS/MMS, Bluetooth and traditional IP-based applications. Our own implementations of two proof-of-concept viruses on Windows Mobile have confirmed the vulnerability of this popular smartphone platform.

In this paper, we present SmartSiren, a collaborative virusdetection and alert system for smartphones. In order to detect viruses, SmartSiren collects the communication activity information from the smartphones, and performs joint analysis to detect both single-device and system-wide abnormal behaviors. We use a proxy-based architecture to offload the processing burden from resource-constrained smartphones and simplify the collaboration among smartphones. When a potential virus is detected, the proxy quarantines the out-break by sending targeted alerts to those immediately threatened smartphones. We have demonstrated the feasibility of SmartSiren through implementations on a Dopod 577w smartphone, and evaluated its effectiveness using simulations driven by 3-week SMS traces from a national cellular carrier. Our results show that SmartSiren can effectively prevent wide-area virus outbreaks with affordable overhead.

References

  1. 29A lab: http://vx.netlux.org/29a/.Google ScholarGoogle Scholar
  2. 3GPP AT commands: http://www.3gpp.org/.Google ScholarGoogle Scholar
  3. Cell Spotting: http://www.cellspotting.com/.Google ScholarGoogle Scholar
  4. Danger Inc.: http://www.danger.com/platform/exp.php.Google ScholarGoogle Scholar
  5. Dopod 577w: http://www.dopodasia.com/.Google ScholarGoogle Scholar
  6. Flexispy: http://www.flexispy.com.Google ScholarGoogle Scholar
  7. HTC: http://www.htc.com/.Google ScholarGoogle Scholar
  8. http://developer.orangews.com/orgspv/comdefq.aspx.Google ScholarGoogle Scholar
  9. http://msdn.microsoft.com/windowsmobile/.Google ScholarGoogle Scholar
  10. https://www.symbiansigned.com/app/page.Google ScholarGoogle Scholar
  11. http://wiki.spv-developers.com/.Google ScholarGoogle Scholar
  12. http://www.f-secure.com/weblog/archives/archive-082005.html.Google ScholarGoogle Scholar
  13. Mobile malware evolution: An overview: http://www.viruslist.com/.Google ScholarGoogle Scholar
  14. Navizon: http://www.navizon.com.Google ScholarGoogle Scholar
  15. Phone viruses: how bad is it?: http://www.newscientist.com/article.ns?id=dn7080.Google ScholarGoogle Scholar
  16. Prank directs phones to call police: http://news.zdnet.com/.Google ScholarGoogle Scholar
  17. Securing consumer-friendly smart phones: http://news.com.com/.Google ScholarGoogle Scholar
  18. Sports fans in Helsinki falling prey to Cabir: http://news.zdnet.com/.Google ScholarGoogle Scholar
  19. T-Mobile SMS-to-Email: http://wiki.howardforums.com/index.php/.Google ScholarGoogle Scholar
  20. T-Mobile USA: http://www.t-mobile.com/.Google ScholarGoogle Scholar
  21. Virus Library: http://www.viruslibrary.com/.Google ScholarGoogle Scholar
  22. Windows mobile business value for mobile operators: http://download.microsoft.com/.Google ScholarGoogle Scholar
  23. www.sans.org/resources/idfaq/integritychecker.php.Google ScholarGoogle Scholar
  24. R. Agrawal, A. Evfimievski, and R. Srikant. Information sharing across private databases. In ACM SIGMOD '03, pages 86--97. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Bose and K. G. Shin. On mobile viruses exploiting messaging and bluetooth services. In SecureComm 06.Google ScholarGoogle Scholar
  26. D. Dagon, T. Martin, and T. Starner. Mobile phones as computing devices: The viruses are coming! IEEE Pervasive Computing, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. W. Enck, P. Traynor, P. McDaniel, and T. L. Porta. Exploiting open functionality in sms-capable cellular networks. In ACM CCS '05. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. C. Guo, H. J. Wang, and W. Zhu. Smart-phone attacks and defenses. In HotNets III, 2004.Google ScholarGoogle Scholar
  29. H. Kim and B. Karp. Autograph: Toward automated, distributed worm signature detection. In Usenix Security Symposium, CA, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. C. Kreibich and J. Crowcroft. Honeycomb-creating intrusion detection signatures using honeypots. In HotNets II, Boston, November 2003.Google ScholarGoogle Scholar
  31. J. W. Mickens and B. D. Noble. Modeling epidemic spreading in mobile environments. In ACM WiSe '05. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. S. Pohlig and M. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory, IT-24:106-110, 1978.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. R. Racic, D. Ma, and H. Chen. Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery. In SecureComm 06.Google ScholarGoogle Scholar
  34. J. Su, K. K. W. Chan, A. G. Miklas, K. Po, A. Akhavan, S. Saroiu, E. de Lara, and A. Goel. A preliminary investigation of worm infections in a bluetooth environment. In WORM '06. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. G. V. Sumeet Singh, Cristian Estan and S. Savage. Automated worm fingerprinting. In OSDI '04, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. D. Tang and M. Baker. Analysis of a metropolitan-area wireless network. Wirel. Netw., 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. P. Traynor, W. Enck, P. McDaniel, and T. L. Porta. Mitigating attacks on open functionality in sms-capable cellular networks. In ACM MobiCom '06. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. C. C. Zou, W. Gong, D. Towsley, and L. Gao. The monitoring and early detection of internet worms. IEEE/ACM Trans. Netw., 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. SmartSiren: virus detection and alert for smartphones

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiSys '07: Proceedings of the 5th international conference on Mobile systems, applications and services
      June 2007
      310 pages
      ISBN:9781595936141
      DOI:10.1145/1247660

      Copyright © 2007 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 June 2007

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate274of1,679submissions,16%

      Upcoming Conference

      MOBISYS '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader