Once smartphones become truly common, so will the viruses that attack them

April 14, 2009
Once smartphones become truly common, so will the viruses that attack them
Professor Albert-Laszlo Barabasi, left, and Ph.D. student Pu Wang studied the spread of mobile viruses.

(PhysOrg.com) -- Northeastern researchers say that it’s only a matter of time before computer viruses attack smartphones, like the Blackberry and iPhone, on a massive scale. But their study may also hold the key to blunting the effects of these attacks.

Northeastern University physicist and network scientist Albert-László Barabási and his coauthors tracked the spreading potential of Bluetooth and multimedia messaging service (MMS) . Writing in the latest issue of Science, they predict that these viruses will become a real threat to those smartphones that gain at least a 10 percent market share.

Currently, the user base for these handheld devices is small and fragmented, making a major virus outbreak impossible, said Barabási, Distinguished Professor of Physics and director of the Center for Complex Research (CCNR) at Northeastern University.

“Once smartphones become more widely used and one of the operating systems increases its market share to a certain percentage,” said Barabási, “the users of that system will become susceptible to mobile viruses within a matter of minutes”—an outbreak that could be worse than anything caused by traditional computer viruses.

However, understanding the basic spreading patterns of these viruses may enable researchers to devise ways to minimize their impact, said Pu Wang, PhD candidate at CCNR and lead author of the study.

The study’s findings “could help estimate the realistic risk carried by mobile viruses and aid the development of proper measures to avoid the costly impact of major outbreaks,” said Wang.

The authors assessed the spreading dynamics of mobile viruses by modeling the location, the mobility and the communication patterns of mobile phone users. In a simulated study, the team used anonymous billing records from a mobile phone provider and tracked the calling patterns and coordinates of the tower closest to the user at the time of the call.

Bluetooth and MMS viruses differ in their spatial spreading patterns: The former infects predominantly users in the geographical vicinity of the virus’ originating point, making its spread relatively slow, while the latter is capable of spreading to everyone in the address book of the originating user within minutes.

Hybrid viruses—capable of simultaneously using both Bluetooth and MMS connections to spread—are also easy to contain at the moment because the operating system’s small market share forces them into the slow Bluetooth spreading mode.

In addition to Wang and Barabási, the study was coauthored by Marta C. González of Northeastern University and César A. Hidalgo of the Center for International Development at Harvard University’s Kennedy School of Government.

Provided by Northeastern University (news : web)

Explore further: The malware attack against mobile phones is mounting

Related Stories

The malware attack against mobile phones is mounting

December 23, 2004

The security challenges in the mobile environment are similar to the problems we have encountered in the PC world. Open platforms are becoming popular in smartphones, for example the Symbian operating system is used in more ...

Study Links Photosynthesis Genes to Marine Virus Fitness

February 4, 2009

(PhysOrg.com) -- A recent Northeastern University study has shown, for the first time, the effect of individual genes on the fitness of a marine species at the ecosystem level. Using his innovative computer simulation model, ...

Recommended for you

Schlieren images reveal supersonic shock waves

August 27, 2015

NASA researchers in California are using a modern version of a 150-year-old German photography technique to capture images of shock waves created by supersonic airplanes. Over the past five years scientists from NASA's Armstrong ...

Interactive tool lifts veil on the cost of nuclear energy

August 24, 2015

Despite the ever-changing landscape of energy economics, subject to the influence of new technologies and geopolitics, a new tool promises to root discussions about the cost of nuclear energy in hard evidence rather than ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.