Sie sind auf Seite 1von 13

Appendices

Appendix A Glossary of Keywords


Bluetooth:
The code name for a new wireless technology developed by Ericsson Inc., Intel Corp.,
Nokia Corp. and Toshiba. The technology enables data connections between electronic
devices such as desktop computers, wireless phones, electronic organizers and printers
in the .! "#z range.
Cabir
$ %luetooth worm for &ymbian 'hones
Comm-worrior
$ %luetooth worm for &ymbian 'hones
EPC:
$n operating system designed specifically for mobile, ()*+based computing
devices. This was the original name for &ymbian )&.
E')C is rumoured to be an acronym for ,Electronic 'iece of Cheese.,
Ga!no"a and Ga!no"b
Tro-an #orse for &ymbian based 'hones
#alware:
&hort for malicious software, a program or file that is designed to specifically damage
or disrupt a system, such as a virus, worm, or a Tro-an horse.
#etalGear
Tro-an #orse for &ymbian based 'hones
#obile:
The term that can be inter+changed with cellular phone or wireless phone
$apid prototypin%
The speedy fabrication of sample parts for demonstration, evaluation, or testing. It
typically utilizes advanced layer manufacturing technologies .
$eco%ni&er:
.esigned for detecting the use of a file of a particular *I*E type and launching the
appropriate application to deal with it.

'(ull")
Tro-an #orse for &ymbian based 'hones
'ymbian:
$ venture formed by Nokia, Ericsson, *otorola, and 'sion to create easy to use
operating systems for wireless devices and personal digital assistants /'.$s0. Their
first operating system is called E')C.
*ro+an ,orse:
This is a program that disguises itself as another program. &imilar to a virus, these
programs are hidden and cause an unwanted effect. They differ from viruses because
they are normally not designed to replicate like a virus.
-irus:
$ software program capable of reproducing itself and usually capable of causing great
harm to files or other programs on the same computer1 ,a true virus cannot spread to
another computer without human assistance,
.in CE:
2indows based )& for mobile phones current update available is 2indows 3.4.
.orm:
$ software program capable of reproducing itself that can spread from one computer
to the ne5t over a network1 ,worms take advantage of automatic file sending and
receiving features found on many computers,
6
Appendix B Catalo%ues of decision
'"/o" )ecision *a(en $easons
7. .omain of information and
network security selected.
Interested to work on secure information
processing.
. %luetooth and *obile security. 'opular common mode of communication.
6. *alware development )ne of the e5isting threats on information
security.
!.
'revious *alware8s 'latform
search (esearch on previous *alware8s behavior and
operations
9. &ymbian *ost popular )& among the *obile phones.
3. &ymbian C:: *a-ority of *alware8s use this language
;. .evelop an au5iliary program To become familiar with &ymbian programming.
<.
.ividing into modules of
%luetooth communication, auto
run = hidden, $ctivity /data0
logging, self replicable code,
*erger of modules.
To reduce comple5ity and develop our *alware
strategically.
!
>. %asic level communication via
%luetooth /&erver client
application0.
To understand %luetooth communication.
74. $ny application that runs on
phone startup/$uto run = hidden0
*alware should be self starting and invisible to
victim
77. 'revious decision suspended till
completion of other modules
?re@uent )& crashes.
Improper recognizer.
7.
Create $ctivity logging module *onitoring feature of the *alware
76 Create %luetooth ?ile Transfer &ensitive data transfer
9
Appendix C *est $eport
Test Id Test Case E5pected (esult $ctual (esult
7.
.evice .iscovery .evice found
successfully
&ame as e5pected
.
.evice .iscovery
with %luetooth
switched off in the
device
*essage no device
in range
&ame as e5pected
6.
.evice &earch
Cancelled
End search &ame as e5pected
!.
&ervice &earch
&tarted
&ervices supporting
on the devices are
shown on Aist
&creen
&ame as e5pected
9.
?or file transfer
,&elect file
?ile selected &ame as e5pected
3
?ile e5changed
started
Error if %luetooth is
off
&ame as e5pected
; ?ile e5changed
started
.evice found,
service found and
file e5changed.
&ame as e5pected
< ?ile e5change
completed
?ile saved &aved on one device
> Aog Engine start &uccessful started &ame as e5pected
74 Biew Aogs &uccessfully shown. &ame as e5pected,
77 Client+&erver
application start
$pplication launch &ame as e5pected
7
&earch for clients in
range
.isplay devices .evices shown
76
(e@uest for adding
in server
Error if file server
%luetooth off
.isplayed error
message
7!
(e@uest for adding
in server
&how device on
server
&ame as e5pected
79
Client send te5t .isplay on server if
%luetooth not off
Te5t found on server
73
&erver te5t send .isplay on client Te5t shown on client
, still some times
client hangs.
3
Appendix ) *ools
Tools for application development C
0an%ua%e+ &ymbian c::
$ very decent language for highly effective memory
management, %ased on common ))'& concept.
')K+
&oftware development kit, used to get factory made functionality in our
application. &ymbian uses different &.D versions for different mobile models. *ost
of these versions are e@uipped with more advancement made time to time name as
?E$TE(E '$CD&.
&.D8s
7. &34 7
st
Edition
a. ?'7
b. ?'
c. ?'6
. &34
nd
Edition
a. ?'7
b. ?'
c. ?'6
6. &34 6
rd
Edition
a. ?'7
Nokia 9;44 E5press *usic Edition /&34 6
rd
?'70 and N; /&34
nd
0 was used for device
debugging.
;
CA$B1)E
Carbide C22 is a software development tool for C:: development on &ymbian
)&. It is used to develop phones that use the )&, as well as applications that run on
those phones. It is based on the Eclipse I.E platform enhanced with e5tra plug+ins to
support &ymbian )& development. The product is developed by Nokia as part of its
Carbide development tools family1 it replaces Code2arrior for &ymbian )& as the
primary development environment for &ymbian )&.
'ymbian '
&ymbian )& is an operating system, designed for mobile devices, with
associated libraries, user interface frameworks and reference implementations of
common tools, produced by &ymbian Atd. It is a descendant of 'sionFs E')C and runs
e5clusively on $(* processors.
&ymbian )& uses ob-ect+orientation, and is written in C::, with a tiny bit of
assembler thrown in at the lowest levels. This means that the vast ma-ority of
applications are written in C::.
The use of C:: in &ymbian )& is not e5actly the same as C:: in other environmentsG
H C:: does more than &ymbian )& re@uires C for e5ample, full+blown multiple
inheritances.
H C:: does less than &ymbian )& re@uires C for e5ample, it doesn8t insist on the
number of bits used to represent the basic types, and it knows nothing about
.AAs.
H .ifferent C:: communities do things differently because their re@uirements are
different. In &ymbian )&, large+scale system design is combined with focus on
error handling and cleanup, and efficiency in terms of ()* and ($*
budgets.
<
'ymbian ' 'tructure:
>
3i%ure A")"4
'ymbian Application 3ile 'tructure
74
3i%ure A")"5
Appendix E Gantt chart
I T$&D N$*E &T$(T .$TE N). )?
.$J&
7 Topic introduction and Aiterature &urvey ;K6K44; 64
'roblem &tatement = (esearch 'apers <KK44; !9
6 'resentation 74K74K44; 4
! )& = Tools %asic 74K77K44; 64
9 'resentation 77K7!K44; 4
3 %asic $pplication 77K79K44; >4
; 'resentation 7K77K44; 4
< $dvance applications /?ile transfer, Aogging0 K79K44< 64
> Combinations )f *odules 6K79K44< !9
77
3i%ure A"E
Appendix 3 Annotated Biblio%raphy
46 'haharudin 1smail and 7ahri ,+ 8unos 9.orms and *ro+ans %o mobile: /1'E$
the '*A$ 1n*ech; 5<; #arch; 5==>
The paper consists of information on smart phones i.e. *obile phones with advances
)& such as &ymbian )&, *icrosoft *obile )& and 'alm )& and details of identified
malware and the threat they possesses to the mobile user.
56 Guanhua 8an; 0eticia Cuellar and -incent -u 9Bluetooth worm Propa%ation:
#obility Pattern #atters?: 0os Alamos /ational 0aboratory; 5==@"
In this paper, we study how mobility patterns affect %luetooth worm spreading speeds.
This paper also e5plains four *obility *odels and their practical uses in different
environments.
7. (andom waypoint model.
. (andom walk model.
6. (andom direction model.
!. (andom landmark model.
A6 Chris 3lei&achy; #ichael 0il+enstam&; Per Bohansson:Can 8ou 1nfect #e /owC
#alware Propa%ation in #obile Phone /etwor(s: California; 'an )ie%o 5==@"
This paper evaluates the effects of *alware 'ropagation in mobile 'hone networks.
This paper evaluates the effects of malware propagating using communication services
in mobile 'hone networks. $s
I0 BoI'
II0 **&
7
<6 Bayant Pariyal 9An Analysis on Cabir #obile !irus: Computer Emer%ency
$esponse *eam; #ay 44; 5==>"
This research report was developed by information and technology ministry of India.
The paper was released to make a public notification regarding latest threat in mobile
communication, very well known as C$%I(. The malware was able to affect &ymbian
34 based mobiles. This malware infection started in Lune 44! and has version varying
from Cabir.$ to Cabir.%
>6 Bin% 'u; Kel!in K"." Chan; E!al de 0ara 9A preliminary 1n!esti%ation of .orm
1nfections in a Bluetooth En!iornment: Dni!ersity of *oronto; 5==@
This paper simulates two e5perimentsG

7. To investigate weather a large+scale %luetooth worm is viable in practice.
$nsG JE&
. &tudy driven simulations to e5amine the propagation dynamics of a %luetooth
worm in a large population.
76

Das könnte Ihnen auch gefallen