syslog
7Jun/110

Temporal Complex Network Measures for Mobile Malware Containment

Posted by John Tang

Picture the scene: you've bought a shiny new smartphone and have been customising it all weekend by installing various apps from the app store, however the following week you encounter a run of bad luck...

...first your house is burgled when you're at work, next your credit card is maxed out, your friends have been receiving spam text messages from you and to top it off, weeks later, some of your colleagues have had the same experience; what is going on?

Little beknown to you, within one of these seemingly innocuous apps lurks a piece of mobile malware (mobware) which has access to a wealth of personal information which an attacker can access remotely. Â