Show simple item record

dc.contributor.authorWang, Pu
dc.contributor.authorGonzalez, Marta C.
dc.contributor.authorMenezes, Ronaldo
dc.contributor.authorBarabási, Albert-László
dc.date.accessioned2016-06-14T15:10:06Z
dc.date.available2016-06-14T15:10:06Z
dc.date.issued2013-06
dc.identifier.issn1615-5262
dc.identifier.issn1615-5270
dc.identifier.urihttp://hdl.handle.net/1721.1/103101
dc.description.abstractThe fast growing market for smart phones coupled with their almost constant on-line presence makes these devices the new targets of malicious code (virus) writers. To aggravate the issue, the security level of these devices is far below the state-of-the art of what is used in personal computers. It has been recently found that the topological spread of multimedia message service (MMS) viruses is highly restricted by the underlying fragmentation of the call graph—the term topological here refers to the explicit use of the call graph topology to find vulnerable phones. In this paper, we study MMS viruses under another type of spreading behavior that locates vulnerable phones by generating a random list of numbers to be contacted, generally referred to as scanning. We find that hybrid MMS viruses including some level of scanning are more dangerous to the mobile community than their standard topological counterparts. Interestingly, this paper shows that the topological and scanning behaviors of MMS viruses can be more damaging in high and low market share cases, respectively. The results also show that given sufficient time, sophisticated viruses may infect a large fraction of susceptible phones without being detected. Fortunately, with the improvement of phone providers’ monitoring ability and the timely installations of patches on infected phones, one can contain the spread of MMS viruses. Our findings lead to a better understanding on how one could prevent the spread of mobile-phone viruses even in light of new behaviors such as scanning.en_US
dc.description.sponsorshipNational Natural Science Foundation (China) (No. 51208520)en_US
dc.description.sponsorshipJames S. McDonnell Foundation (Twenty-First Century Initiative in Studying Complex Systems)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (IIS-0513650 program)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (ITR program (DMR-0426737))en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (DDDAS program (CNS-0540348))en_US
dc.description.sponsorshipCentral South University of Technology (China) (Shenghua Scholar Program)en_US
dc.publisherSpringer Berlin Heidelbergen_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/s10207-013-0203-zen_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceSpringer Berlin Heidelbergen_US
dc.titleUnderstanding the spread of malicious mobile-phone programs and their damage potentialen_US
dc.typeArticleen_US
dc.identifier.citationWang, Pu, Marta C. González, Ronaldo Menezes, and Albert-László Barabási. "Understanding the spread of malicious mobile-phone programs and their damage potential." International Journal of Information Security 12:5 (October 2013), pp. 383-392.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Civil and Environmental Engineeringen_US
dc.contributor.mitauthorGonzalez, Marta C.en_US
dc.relation.journalInternational Journal of Information Securityen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dc.date.updated2016-05-23T12:11:25Z
dc.language.rfc3066en
dc.rights.holderSpringer-Verlag Berlin Heidelberg
dspace.orderedauthorsWang, Pu; González, Marta C.; Menezes, Ronaldo; Barabási, Albert-Lászlóen_US
dspace.embargo.termsNen
dc.identifier.orcidhttps://orcid.org/0000-0002-8482-0318
mit.licenseOPEN_ACCESS_POLICYen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record