毕业设计(论文)外文文献翻译专业计算机科学与技术学生姓名班级学号指导教师信息工程学院MobileMalwareandSmartDeviceSecurity:Trends,ChallengesandSolutionsAbdullahiAraboandBernardiPranggonoTheOxfordInternetInstitute(OII),OxfordUniversity,Oxford,OX13JS,U.K.SchoolofEngineeringandBuiltEnvironment,GlasgowCaledonianUniversity,Glasgow,G40BA,U.K.Abstract—Thisworkispartoftheresearchtostudytrendsandchallengesofcybersecuritytosmartdevicesinsmarthomes.Wehaveseenthedevelopmentanddemandforseamlessinterconnectivityofsmartdevicestoprovidevariousfunctionalityandabilitiestousers.Whilethesedevicesprovidemorefeaturesandfunctionality,theyalsointroducenewrisksandthreats.Subsequently,currentcybersecurityissuesrelatedtosmartdevicesarediscussedandanalyzed.Thepaperbeginswithrelatedbackgroundandmotivation.Weidentifiedmobilemalwareasoneofthemainissueinthesmartdevices’security.Inthenearfuture,mobilesmartdeviceuserscanexpecttoseeastrikingincreaseinmalwareandnotableadvancementsinmalware-relatedattacks,particularlyontheAndroidplatformastheuserbasehasgrownexponentially.Wediscussandanalyzedmobilemalwareindetailsandidentifiedchallengesandfuturetrendsinthisarea.Thenweproposeanddiscussanintegratedsecuritysolutionforcybersecurityinsmartdevicestotackletheissue.Index—Botnet,cybersecurity,mobilemalware,securityframework,smartdevicesecurityI.INTRODUCTIONTheInternetisoneofthemostremarkabledevelopmentstohavehappenedtomankindinthelast100years.Thedevelopmentofubiquitouscomputingmakesthingsevenmoreinterestingasithasgivenusthepossibilitytoutilisedevicesandtechnologyinunusualways.Wehaveseenthedevelopmentanddemandforseamlessinterconnectivityofsmartdevicestoprovidevariousfunctionalitiesandabilitiestousers.Butwealsoknowthevulnerabilitiesthatexistwithinthisecosystem.However,thesevulnerabilitiesarenormallyconsideredforlargerinfrastructuresandlittleattentionhasbeenpaidtothecybersecuritythreatsfromtheusageandpowerofsmartdevicesasaresultoftheInternetofThings(IoT)technologies.IntheIoTvision,everyphysicalobjecthasavirtualcomponentthatcanproduceandconsumeservices.Smartspacesarebecominginterconnectedwithpowerfulsmartdevices(smartphones,tablets,etc.).Ontheotherhand,wealsohavethebackbone,thepowergridthatpowersournations.Thesetwophenomenaarecomingatthesametime.Theincreasedusageofsmartmetersinourhomesorbusinessesprovidesanavenueofconnectivityaswellaspowerfulhomeservicesorinterconnectedpowerfulsmartdevices.Theexampleofthesmartgridalsoprovidesthemeansofcontrollingandmonitoringsmartgridinfrastructuresviatheuseofportablesmartdevices.Thevulnerabilityoftheconnectedhomeanddevelopmentswithintheenergyindustry’snewwirelesssmartgridareexposedtothewrongpeople;itwillinevitablyleadtolightsoutforeveryone.ThiswilleventuallyuncoverthemultitudeofinterconnectedsmartdevicesintheIoTasahotbedforcyber-attacksorrobotnetworks(botnets)andasecuritynightmareforsmartspaceusersandpossiblyfornationalinfrastructuresasawhole.Thelatestresearchhasreportedthatonaveragepeopleownthreeinternet-connectedsmartdevicessuchassmartphonesandtablets.Therefore,asaresultoftheubiquityofsmartdevices,andtheirevolutionascomputingplatforms,aswellasthepowerfulprocessorsembeddedinsmartdevices,hasmadethemsuitableobjectsforinclusioninabotnet.Botnetsofmobiledevices(alsoknownasmobilebotnets)areagroupofcompromisedsmartdevicesthatareremotelycontrolledbybot-mastersviacommand-and-control(C&C)channels.MobilebotnetshavedifferentcharacteristicsinseveralaspectsascomparedtoPC-basedbotnets,suchastheirC&Cchannelsmedium.PC-basedbotnetsareseenasthemostcommonplatformsforsecurityattacks,andmobilebotnetsareseenaslessofathreatincomparisontotheircounterparts.Thisissofordifferentreasons,suchaslimitedbatterypower,resourceissues,andInternetaccessconstraints,etc.Therefore,theeffortsdirectedtoboththemanifestationofoperatingmobilebotnetsandcorrespondingresearchanddevelopmentendeavoursarenotaswideasforPC-basedbotnets.However,thisdevelopmentcouldchangewiththerecentsurgeinpopularityanduseofsmartdevices.Smartdevicesarenowwidelyusedbybillionsofusersduetotheirenhancedcomputingability,practicalityandefficientInternetaccess,thankstoadvancementinsolid-statetechnologies.Moreover,smartdevicestypicallycontainalargeamountofsensitivepersonalandcorporatedataandareoftenusedinonlinepaymentsandothersensitivetransactions.Thewidespreaduseofopen-sourcesmartdeviceplatformssuchasAndroidandthird-partyapplicationsmadeavailabletothepublicalsoprovidesmoreopportunitiesandattractionsformalwarecreators.Therefore,fornowandthenearfuturesmartdeviceswillbecomeoneofthemostlucrativetargetsforcybercriminals.Themainfocusofthispaperisthreefold:firstlytohighlightthepossiblethreatsandvulnerabilityofsmartdevices,secondlytoanalysethechallengesinvolvedindetectingmobilemalwareinsmartdevicesandfinallytoproposeageneralsecuritysolutionthatwillfacilitatesolvingoraddressingsuchthreats.Therestofthepaperisorganizedasfollows.InsectionIIweprovideadetailedanalysisofthesecuritythreatsonsmartdevicesandtheirlinkswithcybersecurity.WehaveidentifiedmobilemalwareasoneofthemainissuesandwediscussitinmoredetailinSectionIII.SectionIVprovidesourproposedsecuritysolu