iSAM: An iPhone Stealth Airborne Malware

Conference object English OPEN
Damopoulos, Dimitrios; Kambourakis, Georgios; Gritzalis, Stefanos;
  • Publisher: Springer
  • Identifiers: doi: 10.1007/978-3-642-21424-0_2
  • Subject: Malware | Airborne | [INFO]Computer Science [cs] | [ INFO ] Computer Science [cs] | Rootkit | Stealth | Jailbreak | iOS | iPhone

Part 2: Malware, Information Flow and DoS Attacks; International audience; Modern and powerful mobile devices comprise an attractive target for any potential intruder or malicious code. The usual goal of an attack is to acquire users’ sensitive data or compromise the de... View more
  • References (22)
    22 references, page 1 of 3

    1. Liu, L., Yan, G., Zhang, X., Chen, S.: VirusMeter: preventing your cellphone from spies: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, Lecture Notes In Computer Science, Springer-Verlag (2009)

    2. Chow, G.W., Jones, A.: A framework for anomaly detection in OKL4-Linux based smartphones: Proceedings of the 6th Australian Information Security Management Conference (2008)

    3. Kaspersky lab at mobile world congress 2009 in Barcelona, http://www. Malware_Evolution_2009

    4. Landesman, M.: The world's largest security analysis of real-world web tra c: annual global threat report, ScanSafe STAT, gtr/2009_AGTR.pdf

    5. Apple introduction to security overview, ios/#documentation/Security/Conceptual/Security_Overview/Introduction/ Introduction.html

    6. Pandya, V.R.: iPhone security analysis. Project Report, Department of Computer Science, San Jose State University (2008)

    7. Chavez, A.: A jailbroken iPhone can be a very powerfull weapon in the hands of an attacker. Project Report, Purdue University, Calumet's CIT Department (2008)

    8. Miller, C., Mulliner, C.: Fuzzing the Phone in your Phone. In: BlackHat, USA (2009)

    9. An analysis of the Ikee.B (Duh) iPhone botnet,

    10. iKee,

  • Related Research Results (1)
    Inferred by OpenAIRE
    star software on GitHub
  • Similar Research Results (1)
  • Metrics
Share - Bookmark