Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,

Slides:



Advertisements
Similar presentations
Mobile Viruses and Worms (Project Group 6) Amit Kumar Jain Amogh Asgekar Jeevan Chalke Manoj Kumar Ramdas Rao.
Advertisements

Enhancing Security Using Mobile Based Anomaly Detection in Cellular Mobile Networks Bo Sun, Fei Yu, KuiWu, Yang Xiao, and Victor C. M. Leung. Presented.
David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.
Rootkits on Smart Phones: Attacks, Implications and Opportunities Jeffrey Bickford, Ryan O’Hare, Arati Baliga, Vinod Ganapathy, and Liviu Iftode Department.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
Defending against Sniffing Attacks on Mobile Phones Liang Cai (University of California, Davis), Sridhar Machiraju (Sprint Applied Research), Hao Chen.
Fine-grained Private Matching for Proximity-based Mobile Social Networking INFOCOM 2012 Rui Zhang, Yanchao Zhang Jinyuan (Stella) Sun Arizona State University.
Daniela Oliveira 1, Dhiraj Murthy 1, Henric Johnson 2, S. Felix Wu 3, Roozbeh Nia 3 and Jeff Rowe 3 1 Bowdoin College 2 Blekinge Institute of Technology.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
SMS WATCHDOG: PROFILING SOCIAL BEHAVIORS OF SMS USERS FOR ANOMALY DETECTION Authors: Guanhua Yan, Stephan Eidenbenz, Emannuele Galli Presented by: Ishtiaq.
FYP Project LYU0301: Secure and Reliable PDA-Based Communication System.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
A Survey on Security for Mobile Devices
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
SMS Mobile Botnet Detection Using A Multi-Agent System Abdullah Alzahrani, Natalia Stakhanova, and Ali A. Ghorbani Faculty of Computer Science, University.
© Blue Coat Systems, Inc John Yun Director, Product Marketing.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
Trojan Virus Presented by Andy Lindberg & Denver Bohling.
Understanding the spreading patterns of mobile phone viruses Presented by Sundararaman Natarajakumar Submitted to Prof.Dr. Eduard Heindl.
 Energy Results: Memory Assistant Arcade Game  Performance Results:  Response Time ▪ Memory assistant: 17.3 sec -> 1.5 sec ▪ Arcade game: 6 FPS -> 13.
Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.
THREATS TO MOBILE NETWORK SECURITY
PrivacyShield: Real-time Monitoring and Detection of Android Privacy Leakage Review and Discussion Yan Chen Lab of Internet and Security Technology Northwestern.
CS 101 – Aug. 26 Definition of computer & CS Making good decisions Computer organization A little history Please read Chapter 1 in book. Tomorrow’s lab:
Performance analysis and prediction of physically mobile systems Point view: Computational devices including Mobile phones are expanding. Different infrastructure.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
11 Automatic Discovery of Botnet Communities on Large-Scale Communication Networks Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium on InformAtion,
J2ME Presented by May Sayed & Menna Hawash. Outline Introduction “Java Technology” Introduction “What is J2ME?” J2ME Architecture J2ME Core Concepts 
AUTHORS: ASAF SHABTAI, URI KANONOV, YUVAL ELOVICI, CHANAN GLEZER, AND YAEL WEISS "ANDROMALY": A BEHAVIORAL MALWARE DETECTION FRAMEWORK FOR ANDROID.
Context-Aware Interactive Content Adaptation Iqbal Mohomed, Jim Cai, Sina Chavoshi, Eyal de Lara Department of Computer Science University of Toronto MobiSys2006.
Operating system Security By Murtaza K. Madraswala.
Leave Me Alone: App-level Protection Against
Behavioral Detection of Malware on Mobile Handsets Abhijit Bose IBM TJ Watson Research Xin Hu University of Michigan Kang G. Shin University of Michigan.
KAIST Internet Security Lab. CS710 Behavioral Detection of Malware on Mobile Handsets MobiSys 2008, Abhijit Bose et al 이 승 민.
SECURING ELASTIC APPLICATIONS ON MOBILE DEVICES FOR CLOUD COMPUTING Xinwen Zhang,Joshua Schiffman,Simon Gibbs 2009 ACM Cloud Computing Security Workshop.
KAIST CS710 컴퓨터구조 특강 유비쿼터스 네트워크와 보안 Syllabus Network & Security Lab.
Android Mobile Security Krystal Salerno. Introductions.
Mobile Communication Middleware By:Lekometsa Mokhesi Anisa Ragalo Supervisor: Ken Macgregor.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
CompSci 725 RiskRanker Authors Michael Grace - North Carolina State University, Raleigh, NC, USA & NQ Mobile Security Research Center, Beijing, China Yajin.
Winning with Check point
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
Cryptography and Network Security Sixth Edition by William Stallings.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
A Framework for Detection and Measurement of Phishing Attacks Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 2/25/2016 Slide.
Rootkits Jonathan Barella Chad Petersen. Overview What are rootkits How do rootkits work How to detect rootkits How to remove rootkits.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Nguyen Thi Thanh Nha HMCL by Ying Zhang, Gang Huang, Xuanzhe Liu, Wei Zhang, Hong Mei, and Shunxiang Yang Refactoring Android Java Code for On-Demand Computation.
Smart Grid & Electric Vehicle in Computer Scientist’s Perspective by Minho Shin, Myongji University.
Research in Computer Graphics, Visualization and Human- Computer Interaction CSc 8900/9900 Ying Zhu Associate Professor Department of Computer Science.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) This Network is Infected: HoSTaGe - a Low-Interaction Honeypot for Mobile.
System Design Basics IB Computer Science.
RCS v7 Infection Vectors
Network Science in NDSSL at Virginia Tech
Operating system Security
Network-based Intrusion Detection, Prevention and Forensics System
Today’s Risk. Today’s Solutions. Cyber security and
Xutong Chen and Yan Chen
Introduction to Internet Worm
Threat Landscape Update
Presentation transcript:

Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang, Computer Science Lab, Samsung Information Systems America Songqing Chen, Department of Computer Science, George Mason University

Outline  Introduction  Related Work  Overview

Introduction  1 billion camera phones to be shipped in 2008  Smartphones: about 10%, 100 million units  By the end of 2007, over 370 different mobile malware  Information stealing, overcharging, battery exhaustion, network congestion

Introduction  Signature-based  Encryption, obfuscation, packing  Anomaly-based  High false alarm rate  Behavioral signatures  Resource-constrained  FlexiSPY-like malware doesn’t show anomalies in the order of relevant API calls

Introduction  VirusMeter  Based on battery power  Challenges  Require power model  Need to measure battery power in real-time  Lightweight. Cannot consume too much CPU and power

Related Work  Infection vectors  Bluetooth, MMS, memory cards, user downloading  Epidemic spreading in mobile, 2005 ACM WiSe  Use user interaction to identify vulnerable users, 2006 ACM WiSe  Behavioral signatures for mobile malware detection, 2008 Mobisys Behavioral signatures for mobile malware detection

Related Work  Limit  Targeting particular situations (e.g., attack through MMS)  Demand significant infrastructure support  Demand non-trivial computing resoures from mobile devices

Overview