Rootkits on Smart Phones Attacks Implications and Opportunities
Smart phones are increasingly being equipped with
gy, fine-grained dynamic instrumentation of commodity kernels, which can splice (insert) dynamically generated code before almost any machine code instruction of a completely unmodified running commodity operating system kernelRootkits on smart phones: attacks, implications and opportunities
free download
ABSTRACT Smart phones are increasingly being equipped with operating sys- tems that compare in complexity with those on desktop comput- ers. This trend makes smart phone operating systems vulnerable to many of the same threats as desktop operating systems. In this paper, we focus on the threat posed by smart phone rootk- its. Rootkits are malware that stealthily modify operating system code and data to achieve malicious goals, and have long been a problem for desktops. We use three example rootkits to show that smart phones are just as vulnerable to
CSE PROJECTS