The Community for Technology Leaders
RSS Icon
Issue No.05 - September/October (2009 vol.7)
pp: 70-74
Stefano Zanero , Politecnico of Milano
In recent years, several authors began to work on the concept of security attacks against wireless communication protocols—in particular, the propagation of malware through them. The idea challenged and thrilled us, mainly because it brought back the concept of physical and geographic interaction in attack scenarios.I believe that the latest "developments" on these threats are stepping progressively away from reality and into an abstract, academic world of their own—something that might be just as fun, but that should be brought back into perspective when assessing the actual risks related to these scenarios. Here we see why, with two distinct examples.
bluetooth, malware, attackers, Wi-Fi, attack trends
Stefano Zanero, "Wireless Malware Propagation: A Reality Check", IEEE Security & Privacy, vol.7, no. 5, pp. 70-74, September/October 2009, doi:10.1109/MSP.2009.142
1. L. Carettoni, C. Merloni, and S. Zanero, "Studying Bluetooth Malware Propagation: The Bluebag Project," IEEE Security &Privacy, vol. 5, no. 2, 2007, pp. 17–25.
2. A. Tsow et al., "Warkitting: The Drive-by Subversion of Wireless Home Routers," J. Digital Forensic Practice, vol. 1, no. 3, 2006, pp. 179–192.
3. P. Akritidis et al., "Proximity Breeds Danger: Emerging Threats in Metro-Area Wireless Networks," Proc. 16th Usenix Security Symposium, Usenix Assoc., 2007, pp. 1–16.
4. H. Hu et al., "WiFi Networks and Malware Epidemiology," Proc. National Academy of Sciences, vol. 106, no. 5, 2009, pp. 1318–1323.
5. S. Stamm, Z. Ramzan, and M. Jakobsson, "Drive-By Pharming," Information and Communication Security, LNCS 4861, Springer-Verlag, 2008, pp. 495–506.
6. E. Tews, R.P. Weinmann, and A. Pyshkin, "Breaking 104-bit WEP in Less than 60 Seconds," Information Security Applications, LNCS 4867, Springer-Verlag, 2008, pp. 188–202.
7. J. Su et al., "A Preliminary Investigation of Worm Infections in a Bluetooth Environment," Proc. 4th ACM Workshop on Recurring Malcode ( WORM 06), ACM Press, 2006, pp. 9–16.
8. J.W. Mickens and B.D. Noble, "Modeling Epidemic Spreading in Mobile Environments," Proc. 4th ACM Workshop on Wireless Security (WiSe 05), 2005, ACM Press, pp. 77–86.
9. G. Yan and S. Eidenbenz, "Modeling Propagation Dynamics of Bluetooth Worms," IEEE Trans. Mobile Computing, vol. 8, no. 3, 2009, pp. 70-7453–368.
10. G. Lawton, "Is It Finally Time to Worry about Mobile Malware?" Computer, vol. 41, no. 5, 2008, pp. 12–14.
11. A. Galante, A. Kokos, and S. Zanero, "Bluebat: Towards Practical Bluetooth Honeypots," Proc. 2009 IEEE Int'l Conf. Communications, IEEE Press, 2009, pp. 1–6.
12. G. Yan and S. Eidenbenz, "Bluetooth Worms: Models, Dynamics, and Defense Implications," Proc. 22nd Ann. Computer Security Applications Conf. (ACSAC 06), IEEE CS Press, 2006, pp. 245–256.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool