Wireless Malware Propagation: A Reality Check

被引:10
作者
Zanero, Stefano [1 ,2 ]
机构
[1] Politecn Milan, I-20133 Milan, Italy
[2] Secure Network, Milan, Italy
关键词
Attack trends; Attackers; Bluetooth; Malware; Wi-Fi;
D O I
10.1109/MSP.2009.142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, several authors began to work on the concept of security attacks against wireless communication protocolsin particular, the propagation of malware through them. The idea challenged and thrilled us, mainly because it brought back the concept of physical and geographic interaction in attack scenarios.I believe that the latest "developments" on these threats are stepping progressively away from reality and into an abstract, academic world of their own-something that might be just as fun, but that should be brought back into perspective when assessing the actual risks related to these scenarios. Here we see why, with two distinct examples. © 2006 IEEE.
引用
收藏
页码:70 / 74
页数:5
相关论文
共 12 条
[1]  
AKRITIDIS P, 2007, P 16 US SEC S US ASS, P1
[2]   Studying Bluetooth malware propagation - The BlueBag project [J].
Carettoni, Luca ;
Merloni, Claudio ;
Zanero, Stefano .
IEEE SECURITY & PRIVACY, 2007, 5 (02) :17-25
[3]  
Galassi A, 2009, P EL DISTR C, P1
[4]   WiFi networks and malware epidemiology [J].
Hua, Hao ;
Myers, Steven ;
Colizza, Vittoria ;
Vespignani, Alessandro .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2009, 106 (05) :1318-1323
[5]   Is it finally time to worry about mobile malware? [J].
Lawton, George .
COMPUTER, 2008, 41 (05) :12-14
[6]  
Mickens JamesW., 2005, WISE 05, P77, DOI DOI 10.1145/1080793.1080806
[7]  
STAMM S, 2008, LNCS, V4861, P495
[8]  
Su Jing., 2006, Proceedings of ACM Workshop on Recurring Malcode (WORM), P9
[9]  
Tews E, 2007, LECT NOTES COMPUT SC, V4867, P188
[10]  
Tsow Alex., 2006, Journal of Digital Forensic Practice, V1, P179