iSAM: An iPhone Stealth Airborne Malware - Future Challenges in Security and Privacy for Academia and Industry Access content directly
Conference Papers Year : 2011

iSAM: An iPhone Stealth Airborne Malware

Dimitrios Damopoulos
  • Function : Author
  • PersonId : 1013416
Georgios Kambourakis
  • Function : Author
  • PersonId : 1013417
Stefanos Gritzalis
  • Function : Author
  • PersonId : 1001901

Abstract

Modern and powerful mobile devices comprise an attractive target for any potential intruder or malicious code. The usual goal of an attack is to acquire users’ sensitive data or compromise the device so as to use it as a stepping stone (or bot) to unleash a number of attacks to other targets. In this paper, we focus on the popular iPhone device.We create a new stealth and airborne malware namely iSAM able to wirelessly infect and self-propagate to iPhone devices. iSAM incorporates six different malware mechanisms, and is able to connect back to the iSAM bot master server to update its programming logic or to obey commands and unleash a synchronized attack. Our analysis unveils the internal mechanics of iSAM and discusses the way all iSAM components contribute towards achieving its goals. Although iSAM has been specifically designed for iPhone it can be easily modified to attack any iOS-based device.
Fichier principal
Vignette du fichier
978-3-642-21424-0_2_Chapter.pdf (247.58 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01567607 , version 1 (24-07-2017)

Licence

Attribution

Identifiers

Cite

Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis. iSAM: An iPhone Stealth Airborne Malware. 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.17-28, ⟨10.1007/978-3-642-21424-0_2⟩. ⟨hal-01567607⟩
66 View
533 Download

Altmetric

Share

Gmail Facebook X LinkedIn More