Security and Privacy in Mobile Information and Communication Systems. Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

Research Article

Event-Based Method for Detecting Trojan Horses in Mobile Devices

Download
466 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-17502-2_13,
        author={Daniel Fuentes and Juan \^{A}lvarez and Juan Ortega and Luis Gonz\^{a}lez-Abril and Francisco Velasco},
        title={Event-Based Method for Detecting Trojan Horses in Mobile Devices},
        proceedings={Security and Privacy in Mobile Information and Communication Systems. Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers},
        proceedings_a={MOBISEC},
        year={2012},
        month={5},
        keywords={Trojan horses mobile devices infection propagation},
        doi={10.1007/978-3-642-17502-2_13}
    }
    
  • Daniel Fuentes
    Juan Álvarez
    Juan Ortega
    Luis González-Abril
    Francisco Velasco
    Year: 2012
    Event-Based Method for Detecting Trojan Horses in Mobile Devices
    MOBISEC
    Springer
    DOI: 10.1007/978-3-642-17502-2_13
Daniel Fuentes1,*, Juan Álvarez1,*, Juan Ortega1,*, Luis González-Abril1,*, Francisco Velasco1,*
  • 1: University of Seville
*Contact email: dfuentes@us.es, jaalvarez@us.es, jortega@us.es, luisgon@us.es, velasco@us.es

Abstract

Mobile phones and wireless technology and its constant evolution have, in the last years, revolutionized the way in which we communicate and work. However, one of the main barriers encounter in the use of these technologies is data security. Trojan horses are dangerous software to attack phones, PDAs and Smartphones. New versions are created everyday to attack the functionality, theft the stored information and propagate themselves. In this paper, we present a new real-time method to detect Trojan horses in mobile devices. We study the events in the device to detect programs which can be suspected to be Trojan horses. By doing so, we can detect not only the known Trojan horses with more accuracy, but also detect new trojans. Practical experiences on different devices have been carried out and results show the effectiveness of the method.