I read about a new type of mobile malware detection that analyzes motion and gestures to detect issues on smartphones....
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
How does this type of antimalware system work? Would it be used in conjunction with other malware detection?
One of the exciting benefits of using new security paradigms on mobile devices is there is a green field for implementing new security controls. This includes many advanced mobile security protection methods at the OS level that Android and iOS have both implemented, but these protections are just improvements over existing systems. On the other hand, there are a number of third-party tools that tackle mobile security threats in novel ways; smartphones, for example, have greater potential for new security controls based on how they can be monitored and how deviations in their usage can be analyzed, reported and investigated.
Researchers from the University of Alabama at Birmingham recently created a new antimalware system that works by monitoring exact usage of a smartphone at a detailed level. For example, it might be uncommon for a person to send a text message while the GPS shows the device is in motion and the mapping software is running. Or it might not be common for a person to be texting while doing other interactive things on their device, such as emailing or social networking. Additional sensors including the accelerometer, GPS and touchscreen allow for an unprecedented level of monitoring motion analysis to correlate with "good activities." To protect users from harm, certain actions could be whitelisted.
This mobile malware detection system, which has not yet been commercialized, could be used alone or in conjunction with other mobile malware detection and security controls. However, there are significant privacy issues software developers and enterprises should consider before using these types of new security controls since they could collect detailed data about employees' behavior and usage patterns.
Ask the Expert:
Want to ask Nick Lewis a question about enterprise threats? Submit your questions now via email. (All questions are anonymous.)
David Strom discusses the changing face of advanced malware defense
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
The CIA Vault 7 cache exposed the Brutal Kangaroo USB malware, which can be spread to computers without an internet connection. Learn how this is ...continue reading
Kaspersky Lab recently accused Windows 10 of acting as an antivirus block to third-party antimalware software. Discover how your software is being ...continue reading
QakBot malware triggered hundreds of thousands of Microsoft Active Directory account lockouts. Discover the malware's target and how these attacks ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.