skip to main content
10.1145/1622103.1629656acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Virtualized in-cloud security services for mobile devices

Published:17 June 2008Publication History

ABSTRACT

Modern mobile devices continue to approach the capabilities and extensibility of standard desktop PCs. Unfortunately, these devices are also beginning to face many of the same security threats as desktops. Currently, mobile security solutions mirror the traditional desktop model in which they run detection services on the device. This approach is complex and resource intensive in both computation and power. This paper proposes a new model whereby mobile antivirus functionality is moved to an off-device network service employing multiple virtualized malware detection engines. Our argument is that it is possible to spend bandwidth resources to significantly reduce on-device CPU, memory, and power resources. We demonstrate how our in-cloud model enhances mobile security and reduces on-device software complexity, while allowing for new services such as platform-specific behavioral analysis engines. Our benchmarks on Nokia's N800 and N95 mobile devices show that our mobile agent consumes an order of magnitude less CPU and memory while also consuming less power in common scenarios compared to existing on-device antivirus software.

References

  1. P. Chen and B. Noble. When virtual is better than real. Proceedings of the 2001 Workshop on Hot Topics in Operating Systems (HotOS), pages 133--138, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Cox and P. Chen. Pocket Hypervisors: Opportunities and Challenges. Proceedings of HotMobile, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. F-Secure Corporation. F-secure mobile anti-virus. http://mobile.f-secure.com/, 2008.Google ScholarGoogle Scholar
  4. J. Flinn, D. Narayanan, and M. Satyanarayanan. Self-tuned remote execution for pervasive computing. In Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII), pages 61--66, Schloss Elmau, Germany, May 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Fox, S. Gribble, E. Brewer, and E. Amir. Adapting to network and client variability via on-demand dynamic distillation. ACM SIGPLAN Notices, 31(9):160--170, 1996.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Google. Android - an open handset alliance project. http://code.google.com/android/, 2008.Google ScholarGoogle Scholar
  7. Google. Google safe browsing. http://code.google.com/apis/safebrowsing/, 2008.Google ScholarGoogle Scholar
  8. Kaspersky Lab. Kaspersky mobile security. http://usa.kaspersky.com/products_services/mobile-security.php, 2008.Google ScholarGoogle Scholar
  9. T. Kunz and S. Omar. A mobile code toolkit for adaptive mobile applications. In Proceedings of the 3rd IEEE Workshop on Mobile Computing Systems and Applications, pages 51--59, Monterey, CA, December 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Nokia Corporation. Maemo sdk. http://maemo.org/, 2008.Google ScholarGoogle Scholar
  11. Nullriver, Inc. iphone installer.app. http://iphone.nullriver.com/, 2008.Google ScholarGoogle Scholar
  12. J. Oberheide, E. Cooke, and F. Jahanian. Rethinking antivirus: Executable analysis in the network cloud. In 2nd USENIX Workshop on Hot Topics in Security (HotSec 2007), August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Oberheide, E. Cooke, and F. Jahanian. Cloudav: N-version antivirus in the network cloud. July 2008. To Appear in the Proceedings of the 17th USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Ogness. Dazuko: An open solution to facilitate on-access scanning. Virus Bulletin, 2003.Google ScholarGoogle Scholar
  15. A. Rudenko, P. Reiher, G. J. Popek, and G. H. Kuenning. The Remote Processing Framework for portable computer power saving. In Proceedings of the ACM Symposium on Applied Computing, San Antonio, TX, February 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Sourcefire, Inc. Clamav antivirus. http://www.clamav.net/, 2008.Google ScholarGoogle Scholar
  17. Symantec Corporation. Symantec mobile antivirus for windows mobile. http://www.symantec.com/norton/products/overview.jsp?pcid=pf&pvid=smavw%m, 2008.Google ScholarGoogle Scholar
  18. K. Veeraraghavan, E. Nightingale, J. Flinn, and B. Noble. qufiles: a unifying abstraction for mobile data management. In The Ninth Workshop on Mobile Computing Systems and Applications (HotMobile 2008), February 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. B. Zenel. A general purpose proxy filtering mechanism applied to the mobile environment. Wireless Networks, 5(5):391--409, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Virtualized in-cloud security services for mobile devices

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiVirt '08: Proceedings of the First Workshop on Virtualization in Mobile Computing
      June 2008
      31 pages
      ISBN:9781605583280
      DOI:10.1145/1622103

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 June 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Upcoming Conference

      MOBISYS '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader