Once smartphones become truly common, so will the viruses that attack them

Apr 14, 2009
Once smartphones become truly common, so will the viruses that attack them
Professor Albert-Laszlo Barabasi, left, and Ph.D. student Pu Wang studied the spread of mobile viruses.

(PhysOrg.com) -- Northeastern researchers say that it’s only a matter of time before computer viruses attack smartphones, like the Blackberry and iPhone, on a massive scale. But their study may also hold the key to blunting the effects of these attacks.

Northeastern University physicist and network scientist Albert-László Barabási and his coauthors tracked the spreading potential of Bluetooth and multimedia messaging service (MMS) . Writing in the latest issue of Science, they predict that these viruses will become a real threat to those smartphones that gain at least a 10 percent market share.

Currently, the user base for these handheld devices is small and fragmented, making a major virus outbreak impossible, said Barabási, Distinguished Professor of Physics and director of the Center for Complex Research (CCNR) at Northeastern University.

“Once smartphones become more widely used and one of the operating systems increases its market share to a certain percentage,” said Barabási, “the users of that system will become susceptible to mobile viruses within a matter of minutes”—an outbreak that could be worse than anything caused by traditional computer viruses.

However, understanding the basic spreading patterns of these viruses may enable researchers to devise ways to minimize their impact, said Pu Wang, PhD candidate at CCNR and lead author of the study.

The study’s findings “could help estimate the realistic risk carried by mobile viruses and aid the development of proper measures to avoid the costly impact of major outbreaks,” said Wang.

The authors assessed the spreading dynamics of mobile viruses by modeling the location, the mobility and the communication patterns of mobile phone users. In a simulated study, the team used anonymous billing records from a mobile phone provider and tracked the calling patterns and coordinates of the tower closest to the user at the time of the call.

Bluetooth and MMS viruses differ in their spatial spreading patterns: The former infects predominantly users in the geographical vicinity of the virus’ originating point, making its spread relatively slow, while the latter is capable of spreading to everyone in the address book of the originating user within minutes.

Hybrid viruses—capable of simultaneously using both Bluetooth and MMS connections to spread—are also easy to contain at the moment because the operating system’s small market share forces them into the slow Bluetooth spreading mode.

In addition to Wang and Barabási, the study was coauthored by Marta C. González of Northeastern University and César A. Hidalgo of the Center for International Development at Harvard University’s Kennedy School of Government.

Provided by Northeastern University (news : web)

Explore further: Brain inspired data engineering

add to favorites email to friend print save as pdf

Related Stories

The malware attack against mobile phones is mounting

Dec 23, 2004

The security challenges in the mobile environment are similar to the problems we have encountered in the PC world. Open platforms are becoming popular in smartphones, for example the Symbian operating system is used in more ...

Study Links Photosynthesis Genes to Marine Virus Fitness

Feb 04, 2009

(PhysOrg.com) -- A recent Northeastern University study has shown, for the first time, the effect of individual genes on the fitness of a marine species at the ecosystem level. Using his innovative computer simulation model, ...

New NEC Technology Isolates Viruses At the Core

Oct 09, 2007

NEC has developed a new technology for spotting, isolating and stopping viruses at the core level of its multi-core CPU. Thus, the system keeps running, while the infected core is disabled while a fix is developed ...

Recommended for you

Brain inspired data engineering

10 hours ago

What if next-generation ICT systems could be based on the brain's structure and its cognitive and adaptive processes? A groundbreaking paradigm of brain-inspired intelligent ICT architectures is being born.

Forging a photo is easy, but how do you spot a fake?

Nov 21, 2014

Faking photographs is not a new phenomenon. The Cottingley Fairies seemed convincing to some in 1917, just as the images recently broadcast on Russian television, purporting to be satellite images showin ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.