Skip to main content
Log in

About malicious software in smartphones

  • Original Paper
  • Published:
Journal in Computer Virology Aims and scope Submit manuscript

Abstract

Phones with some of the capabilities of modern computers also have the same kind of drawbacks. These phones are commonly referred to as smartphones. They have both phone and personal digital assistant (PDA) functionality. Typical to these devices is to have a wide selection of different connectivity options from general packet radio service (GPRS) data transfer to multi media messages (MMS) and wireless local area network (WLAN) capabilities. They also have standardized operating systems, which makes smartphones a viable platform for malware writers. Since the design of the operating systems is recent, many common security holes and vulnerabilities have been taken into account during the design. However, these precautions have not fully protected these devices. Even now, when smartphones are not that common, there is a handful of viruses for them. In this paper we will discuss some of the most typical viruses in the mobile environment and propose guidelines and predictions for the future.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Vaughan-Nichols, S. J.: OSs Battle in the Smart-Phone Market. IEEE Comput. Soc. 36(6), 10–12, ISSN: 0018-9162 (2003)

    Google Scholar 

  2. ZdNet Research: IDC: smartphone OS market shares. http://www.itfacts.biz/index.php?id=P323 (29.6.2006) (2003)

  3. Ziff Davis Media Inc.: Linux trails Windows, Symbian in converged mobile devices. http://linuxdevices.com/news/NS4058662049.html (29.6.2006) (2005)

  4. Wong, F.-L., Stajano, F., Clulow, J.: Repairing the Bluetooth pairing protocol. (2005)

  5. Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. http:// www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/index.html (29.6.2006) (2005)

  6. F-Secure: CardTrap. http://www.f-secure.com/v-descs/card- trap\_a.shtml (20.6.2006) (2006)

  7. Finnish Communications Regulatory Authority: Be Careful When Installing Programs. http://www.ficora.fi/mobiiliturva/english/8.html (20.6.2006) (2006)

  8. F-Secure: Commwarrior.A. http://www.f-secure.com/v-descs/commwarrior.shtml (28.3.2005) (2005)

  9. F-Secure: Lasco.A. http://www.f-secure.com/v-descs/lasco\_a.shtml (28.3.2005) (2005)

  10. Symentec: Palm.Phage.Dropper. http://securityresponse.symantec.com/avcenter/venc/data/palm.phage.dropper.html (28.3.2005) (2005)

  11. Airscanner Corp.: Airscanner Mobile Antivirus for Windows Mobile Smartphone. http://airscanner.com/downloads/smartphone/smav.html (28.3.2005) (2003)

  12. Kaspersky Lab: Kaspersky Anti-Virus Mobile. http://www.kaspersky.com/ beta?product=159494805 (28.3.2005) (2005)

  13. F-Secure: Mabir.A. http://www.f-secure.com/v-descs/mabir.shtml (13.4.2005) (2005)

  14. EICAR: The Anti-Virus test file. http://www.eicar.org/ anti\_virus\_test\_file.htm (25.4.2005) (2003)

  15. F-Secure: F-Secure Mobile Anti-Virus. http://www.f-secure.co.uk/products/fsmav.html (11.6.2006) (2006)

  16. Sanomat, H.: Helsingin Sanomat. http://www.helsingin-sanomat.fi/ (28.6.2006) (2006)

  17. Valtovaara M. (2005) Kannykkaan tullut multimediaviesti aiheutti isot kulut. Helsingin Sanomat. 22, A8

    Google Scholar 

  18. Niemelä, J.: What Makes Symbian Malware Tick. In: Proceedings of the 15th Virus Bulletin Conference. Virus Bulletin Ltd., England. pp. 314–322 (2005)

  19. Mickens, J.W., Noble, B.D.: Modeling epidemic spreading in mobile environments (2005)

  20. Kephart, J., White, S.: Directed-graph epidemiological models of computer viruses. In: Proceedings of the IEEE Computer Symposium on Research in Security and Privacy, pp. 343–359. May 1991

  21. F-Secure: RedBrowser. http://www.f-secure.com/v-descs/red- browser\_a.shtml (20.6.2006) (2006)

  22. Nokia: Series 60 Platform 3rd Edition: What’s New for Developers. http://sw.nokia.com/id/738fd4e2-aa2b-4722-b3b9-25ed7b6858f5/S60\_3rd\_Edition\_What’s\_New\_for\_Developers\_v1\_ 3_en. pdf (20.6.2006) (2005)

  23. F-Secure: FlexiSpy. http://www.f-secure.com/v-descs/flexis- py\_a.shtml (20.6.2006) (2006)

  24. FlexiSpy: FlexiSpy - Spy Software for mobile cell phones. Protect your children, catch cheating spouses!. http://www.flexispy.com/index.html (20.6.2006) (2006)

  25. F-Secure: Skulls.D. http://www.f-secure.com/v-descs/skulls \_d.shtml (20.6.2006) (2006)

  26. Will, S.: Smartphone virus hype dismissed. http://news.zdnet.co.uk/hardware/mobile/0,39020360,39197468,00.htm (7.3.2006) (2005)

  27. Matt, H.: Smartphone users ‘aware of the growing threat’. http://news.zdnet.co.uk/hardware/mobile/0,39020360,39196753,00.htm (7.3.2006) (2005)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marko Helenius.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Töyssy, S., Helenius, M. About malicious software in smartphones. J Comput Virol 2, 109–119 (2006). https://doi.org/10.1007/s11416-006-0022-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-006-0022-0

Keywords

Navigation