Mobile Virus full report
#6

Presented by:
Amit Kumar Jain
Amogh Asgekar
Jeevan Chalke
Manoj Kumar
Ramdas Rao

[attachment=9942]
Mobile Viruses and Worms
Introduction

 What is a Mobile Virus?
– “Mobile” : pertaining to mobile devices
• cell phones, smart phones, PDAs, ...
 Mobile Virus vs. Computer Virus
 Mobile Malware:
– “Malware”: Malicious Software
– All kinds of unwanted malicious software
Differences with PC
 Although similar OSes are being used, differences exist:
 Lesser users of mobiles are less “tech literate”
 Implies that it is difficult to “rollout security patches” to phones already sold
 Mobiles are always “connected” and switched on
 “Environment” keeps changing
 Imagine one infected phone in a stadium full of people
Differences...
 On the positive side:
 Several variants of phones exist
 A malware for one type of phone may not necessarily be able to infect others
 E.g., A virus that uses an MMS exploit cannot infect a phone that does not have that facility at all
 Mobile malware not yet causing critical harm
 At most
 they increase the user's billing, or
 cause the mobile phone to stop working (can be restored by a factory reset)
Classification ofMobile Worms and Viruses
Classification
 Behavior
 Virus
 Worm
 Trojan
 Environment
 Operating System
 Vulnerable Application
 Family name and Variant identifier
Classification (examples)
• Mobile Virus Families
• Current threats by mobile malware

 For financial gain / loss
 Unnecessary calls / SMS / MMS
 Send and sell private information
 Cause phones to work slowly or crash
 Wipe out contact books and other information on the phone
 Remote control of the phone
 Install “false” applications
Case Studies
• Case Study – CABIR

 First mobile worm
 Only as Proof-Of-Concept
 Spread vector – Bluetooth
 Infected file – caribe.sis
 15 new variants exist
Case Study - ComWar
 Second landmark in mobile worms
 Spread vector - Bluetooth and MMS
 Large spread area due to MMS
 Not as proof of concept – Intention to harm by charging the mobile user
 Multiple variants detected
Case Study - CardTrap
 First cross-over mobile virus found
 Can migrate from mobile to PC
 Propogates as infected mobile application as well as Windows worm
 2 variants found – Both install with legitimate applications – Black Symbian and Camcorder Pro
Futuristic Threats
• Futuristic Developments

 Location Tracking
 Camera and Microphone Bug
 Leaking Sensitive Information
 DDOS attack on Mobile Service Provider
Protective Measures
• Securing against attacks

 System level security
 MOSES
 Network Level Security
 Proactive approach
MOSES
 MObile SEcurity processing System
– Ravi (2005)
 Two levels of defenses – Hardware and Software
 Hardware – Application Fencing
 Software – Encryption
MOSES
• Secure boot and run-time memory protection

– prevents software (virus) and physical (code modification) attacks
• Provides crypto functions and meets performance and power targets
• Provides protection to any sensitive data or cryptographic keys against common attacks
• Proactive Approach
 Paper by Bose, Shin
 Reduce the impact of an attack
 Generate Behavior Vectors
 Form Behavioral Clusters
• Proactive Approach
 Virus Throttling Algorithm
 Quarantine
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: santilli magnegas hoax, virus encyclopedia, report on mobile virus security*, mobile virus pdf, super virus detector, seminar for mobile virus, mobile virus,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Mobile Virus full report - by projectsofme - 15-10-2010, 04:54 PM
RE: Mobile Virus full report - by projectsofme - 21-12-2010, 03:33 PM
RE: Mobile Virus full report - by seminar class - 10-03-2011, 12:52 PM
RE: Mobile Virus full report - by seminar addict - 09-02-2012, 10:25 AM
RE: Mobile Virus full report - by stefani88 - 09-02-2012, 02:02 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Transparent electronics full report seminar surveyer 8 25,240 04-04-2018, 07:54 AM
Last Post: Kalyani Wadkar
  wireless charging through microwaves full report project report tiger 90 72,025 27-09-2016, 04:16 AM
Last Post: The icon
  Wireless Power Transmission via Solar Power Satellite full report project topics 32 51,105 30-03-2016, 03:27 PM
Last Post: dhanabhagya
  surge current protection using superconductors full report computer science technology 13 27,459 16-03-2016, 12:03 AM
Last Post: computer science crazy
  paper battery full report project report tiger 57 62,707 16-02-2016, 11:42 AM
Last Post: Guest
  IMOD-Interferometric modulator full report seminar presentation 3 11,745 18-07-2015, 10:14 AM
Last Post: [email protected]
  Home appliance & pc Cursor control by mobile phone (DTMF) smart paper boy 3 3,617 21-05-2015, 03:16 PM
Last Post: seminar report asees
  digital jewellery full report project report tiger 36 67,394 27-04-2015, 01:29 PM
Last Post: seminar report asees
  LOW POWER VLSI On CMOS full report project report tiger 15 22,703 09-12-2014, 06:31 PM
Last Post: seminar report asees
  eddy current brake full report project report tiger 24 34,107 14-09-2014, 08:27 AM
Last Post: Guest

Forum Jump: