Abstract
This chapter presents three taxonomies for mobile malicious code. The taxonomies were based on infection strategies, distribution, and payload. The taxonomies include taxa that highlight what has already been seen in known mobile malware (MM) samples. It is clear that MM has borrowed heavily from classic viruses. Also, the known MM samples have shown novel approaches that are only possible now with the technologies made available with mobile devices. Bluetooth, SMS, and MMS are all new vectors unique to mobile devices that are being heavily used by MM. The taxonomies have also shown potential approaches that are yet to occur but that carry a high probability of appearing in the future. The mobile devices will be a singular target of several future MMs, and steps to avoid these potential epidemics and headaches must be taken; otherwise, the result could be nothing less than disastrous.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.