Mobile application markets currently serve as the main line of defense against malicious applications. While marketplace revocations have successfully removed the few overtly malicious applications installed on mobile devices, the anticipated coming flood of mobile malware mandates the need for mechanisms that can respond faster than manual intervention. In this paper, we propose an infrastructure that automatically identifies and responds to malicious mobile applications based on their network behavior. We design and implement a prototype, Airmid, that uses cooperation between in-network sensors and smart devices to identify the provenance of malicious traffic. We then develop sample malicious mobile applications exceeding the capabilities of malware recently discovered in the wild, demonstrate the ease with which they can evade current detection techniques, and then use Airmid to show a range of automated recovery responses ranging from on-device firewalling to application removal. Copyright 2011 ACM.
CITATION STYLE
Nadji, Y., Giffin, J., & Traynor, P. (2011). Automated remote repair for mobile malware. In ACM International Conference Proceeding Series (pp. 413–422). https://doi.org/10.1145/2076732.2076791
Mendeley helps you to discover research relevant for your work.