Browse > Article

Analysis Method and Response Guide of Mobile Malwares  

Kim, Ik-Su (숭실대학교 컴퓨터학부)
Jung, Jin-Hyuk (숭실대학교 컴퓨터학부)
Lee, Hyeong-Chan (숭실대학교 컴퓨터학부)
Yi, Jeong-Hyun (숭실대학교 컴퓨터학부)
Abstract
Korean government has recently abrogated WIPI policy to open domestic mobile phone market to the world, which may result in the influx of foreign smart phones. This circumstance has given users more wide range of choices to buy a product and also has brought benefit to buy mobile phone cheaply. On the other hands, this change might have brought potential danger of mobile malware incidents which have only occurred in foreign countries. There are standardized analysis methods and response guides for computer malwares, not but for mobile malwares in our country. In this paper, we introduce existing mobile malwares and available tools for their analysis. Considering domestic circumstances which might not be properly protected against mobile malwares, we propose analysis methods and response guide of mobile malwares.
Keywords
Mobile Malware; Malicious Code; Smart Phone; Analysis Tool; Windows Mobile;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Jansen and K. Scarfone, "Guidelines on Cell Phone and PDA Security," NIST, 2008.
2 A. Schmidt and S. Albayrak, "Malicious Software for Smartphones," Tech. Rep., DAILabor, 2008.
3 M. Khapra and N. Uchat, "Mobile Worms, Viruses and Threats," Indian Institute of Technology.
4 A. Gostev, "Mobile Malware Evolution: An Overview," 2006.
5 Available at http://www.gartner.com/it/page.jsp?id=910112
6 S. Sudan, S. Drake, and B, Burke, "Worldwide Mobile Device Security 2007-2011 Forecast," IDC, 2007.
7 Available at http://www.boannews.com/media/view.asp?idx=15635&kind=1
8 A. Gostev, "Kaspersky Security Bulletin 2006: Mobile Malware," 2007.
9 Available at http://www.f-secure.com
10 "The CIO's Guide to Mobile Security," Research In Motion Limited, 2006.
11 "WAP Push Technology Overview," Openwave Systems, 2002.
12 White Paper: Protecting mobile Data and Increasing Productivity," Trend Micro, 2007.
13 K. Scarfone and J. Padgette, "Guide to Bluetooth Security," NIST, 2008.
14 "Policy and Guidance for the Use of BlackBerry by the Australian Government," Australian Government, 2006.
15 "Comparison of WAP Push and Short Message Service(SMS)," Openwave Systems, 2002.
16 "WAP Push Architectural Overview," Wireless Application Protocol Forum, 2001.
17 Available at http://www.etimes.net/Service/etimes_2007/ShellView.asp?ArticleID=2009101513203001749&LinkID=6019&newsset=IT_juyo
18 정진혁, 이형찬, 김익수, 이정현, "모바일 악성코드 현황 및 대응 방안", 한국정보보호학회 동계학술대회, 2009.
19 K. Dunham, S. Abu-Nimeh, M. Becher, S. Fogie, B. Hernacki, J. A. Morales, and C. Wright, Mobile Malware Attacks and Defense, Syngress, 2008.