Efficient signature based malware detection on mobile devices

被引:38
作者
Venugopal, Deepak [1 ]
Hu, Guoning [2 ]
机构
[1] Nokia Inc, Irving, TX 75039 USA
[2] Truveo Inc, AOL Co, San Francisco, CA 94104 USA
关键词
Malware; signature detection; mobile and security;
D O I
10.1155/2008/712353
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The threat of malware on mobile devices is gaining attention recently. It is important to provide security solutions to these devices before these threats cause widespread damage. However, mobile devices have severe resource constraints in terms of memory and power. Hence. even though there are well developed techniques for malware detection on the PC domain. it requires considerable effort to adapt these techniques for mobile devices. In this paper, We outline the considerations for malware detection on mobile devices and propose a signature based malware detection method. Specifically, we detail a signature matching algorithm that is well suited for use in mobile device scanning due to its low memory requirements. Additionally. the matching algorithm is shown to have high scanning speed which makes it unobtrusive to Users. Our evaluation and comparison study with the well known Clam-AV scanner shows that our solution consumes less than 50% of the memory Used by Clam-AV while maintaining a fast scanning rate.
引用
收藏
页码:33 / 49
页数:17
相关论文
共 36 条
[1]   EFFICIENT STRING MATCHING - AID TO BIBLIOGRAPHIC SEARCH [J].
AHO, AV ;
CORASICK, MJ .
COMMUNICATIONS OF THE ACM, 1975, 18 (06) :333-340
[2]   Implementation results of bloom filters for string matching [J].
Attig, M ;
Dharmapurikar, S ;
Lockwood, J .
12TH ANNUAL IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2004, :322-323
[3]   FAST STRING SEARCHING ALGORITHM [J].
BOYER, RS ;
MOORE, JS .
COMMUNICATIONS OF THE ACM, 1977, 20 (10) :762-772
[4]  
COMMENTZWALTER B, 1979, LECTURE NOTES COMPUT, V71, P118
[5]  
CORMEN TH, 2002, INTRO ALGORITHMS, P966
[6]  
Cover TM, 2006, Elements of Information Theory
[7]   Mobile phones as computing devices: The viruses are coming! [J].
Dagon, D ;
Martin, T ;
Starner, T .
IEEE PERVASIVE COMPUTING, 2004, 3 (04) :11-15
[8]  
ENGELSCHALL RS, DJB HASH
[9]  
Erdogan O, 2005, GLOB TELECOMM CONF, P1767
[10]  
FISK M, 2001, CS20010670 U CAL