5. Malware Protection/Prevention TechniquesPrevention through Platform DiversityOne of the main clues to the presence of malware is provided by the battery consumption pattern of the application or software suspected of being malware. The key to identifying a misbehaving application using battery power consumption is to determine the battery consumption pattern of a normal application. The techniques used to detect real-time energy consumption statistics are relatively low cost. Work by Jacoby and others identified techniques such that greedy malware would always perform certain malicious activities such as scanning or sending SMS that would be identified in their energy consumption behavior. Figure 11: Bridge mode for execution The idea of maintaining platform diversity could be an effective solution to reduce the number of malware. A single piece of malware would be rendered ineffective if there was a completely different interface connecting any two mobile devices. Yan and colleagues suggest using a two-layer protection mechanism to thwart mobile malware. One of the levels you encounter is during app installation. The user is prompted to switch to a bridged mode during app installation and to a different execution environment when developing a particular application. The challenge faced while using this approach is to properly map the execution environment for development. The bridge phase should be as short as possible. Figure 12: Sandbox approach Figure 13: Power consumption Sandboxing your app allows you to remove certain privileges to be temporarily revoked. Therefore, in some cases, sandboxing can provide effective protection from malware. A hardware sandbox is further useful in protecting the hardware key re...... middle of paper ......art is responsible for maintaining a list of rules that can detect any suspicious behavior of the app while maintaining known signatures. The second part would include a utility like snort provided as open source with the Ubuntu 12.04 version that can monitor network interfaces. Previously created rules also contain known and safe signatures to avoid false positives. The VPN tunnel captures traffic flowing between your smartphone and the Internet. The following HTTP requests are marked according to the applied signing rules. The VPN tunnel captures traffic flowing between your smartphone and the Internet. The following HTTP requests are marked according to the applied signing rules.Malware detected: TrojanFakeLookoutMalware detected:AndroidFakelash - SMS Trojan for AndroidMalware detected:AndroidFakelash - SMS Trojan for Android
tags