Mobile Threats
Things Your Smartphone Does When Nobody is Looking
Agenda
    The “What”


The Problem               Mobile Ecosystem




  1              2            3              4
                Threat                       The Fix
              Landscape
The Problem




  1
What Are The Risks
 Define the Threats
Moving Into The Enterprise
  Bring Your Own Device




 Security      Compliance   Privacy
Mobile Crossroads
    The Inflection Point




  63%
Do you trust the security of your mobile device…




         Have yet to make up their minds
Threat Landscape




     2
The Mobile Threat Landscape
Mobile Malware
Mobile Networks
   Decentralized
   Interconnected
   Mobile
   Quick Content Retrieval

Perfect Malware
   Decentralized
   Interconnected
   Mobile
   Quick Content Retrieval
Statistics
Malware Timeline


2011

July    August    September     October     November




  Early to       Malware Wave             Exponential
 the Game           Begins                  Growth
Primary Target
Android Most Targeted (65%)
iOS Absent (<1%)
                                             WHY              •   Closed Technology
                                   1%
                                                              •   Harder to Reverse Engineer
                             7%
                                                              •   Stronger OS Security
                                                        65%
                 27%                                          •   Better App Store Security
                                                              •   No Fragmentation Issue
Android
J2ME
Symbian
Windows Mobile

      Distribution of Mobile Threats by Platform 2011
Mobile Malware

86%                                                            7%
      Repackaging                  Update
      •Choose popular app          •Similar to repackaging
      •Disassemble                 •Does not add full
      •Add malicious payloads       payload
      •Re-assemble                 •Adds small downloader
      •Submit new app to           •Payload downloaded at
       public market                runtime




      Drive-By                     Standalone
      •Entice users to             •Commercial spyware
       download malware            •Non functional fake apps



<1%                                                            14%
      •Distributed via malicious    (Fake Netflix)
       websites                    •Functional Trojan code
      •May or may not contain      •Apps with root exploits
       a browser exploit
Mobile Malware

37%   Privilege Escalation
      •Attempts root exploits
      •Small number of platform
       vulnerabilities
                                   Remote Control
                                   •Similar to PC bots
                                   •Most use HTTP based web
                                    traffic as C&C
                                                                93%
      •May use more than one       •Advanced C&C models
       exploit for attack           translating from PC world
      •Advanced obfuscation seen
       in the wild



      Financial Charges            Information Collection

45%
      •Premium rate SMS
      •Both hard-coded and
       runtime updated numbers
      •Employ SMS filtering
                                   •Harvests personal
                                    information and data
                                   •User accounts
                                   •GPS location
                                                                45%
SMS                                •SMS and emails
                                   •Phone call tapping
                                   •Ad Libraries
                                                                Phone
                                                                Number
Application Behaviors

 Previous Code        Web Sources




              Your Code




Binary 3rd Party     Source 3rd Party
    Libraries           Libraries
Case studies
               …   !
Vulnerabilities
• Sensitive data leakage
  (inadvertent or side channel)

• Unsafe sensitive data storage

• Unsafe sensitive data
  transmission

• Hardcoded password/keys
Vulnerabilities

• Layered APIs on common
  languages

• Blackberry and Android
  use Java as a base

• Non-issue for Objective-C
  (it’s own language)
Mobile Ecosystem




     3
The Mobile Ecosystem
 The Players of the Game




                 Consumer
MDM Vendors
 The Enterprise Choke Point



                              Enterprise Control Point
                              What They Provide
                               Device Enrollment and Management
                               Security Management
                               Device Configuration
                               Device Monitoring
                               Software Management
                              Security Components
                               Passcode Enforcement
                               Encryption
                               Feature Restriction
                               Compliance
                               Locate and Wipe
                               Certificate Management
Mobile Anti-Virus
 Old Methods Rehashed



                        Old Methods Rehashed
                        What They Provide
                         Quarantine and Eradicate Malware
                         Signature Based Analysis

                        Security Components
                         Locate, Lock, and Wipe
                         Cloud Analysis
                         Spam Filtering
                         Email Attachment Scanning
                         Data Backup
Application Markets
 The Distributor



                   The Distributor

                   What They Provide
                    Marketplace for Applications
                    User Ratings
                    Application Updates

                   Security Components
                    Application Approval Process
                            Android Bouncer
                            iOS Scanning
Developers
 The Source



              The Source

               What They Provide
               Enterprise Application Development
               Consumer Application Development
               Cross-platform Expertise


               Security Components
               Variable on Developer Capabilities
The Fix




4
The Fix
 Securing Against Multiple Threats



Capabilities Mapping

     Malware Detection

Vulnerability Analysis
Capabilities Mapping
 Features and Permissions

                   Data Sources            Data Sinks                 Mapping


               •   Location Data     •   HTTP Requests
 User Facing




               •   Contacts          •   Outbound SMS
               •   Email             •   Outbound Email        •   Trace Sources to Sinks
               •   SMS Data          •   DNS Requests          •   Application “Intent”
               •   SQL Access        •   TCP                   •   Permission Mapping
               •   File System       •   UDP                   •   Human Intelligence
               •   Photos            •   Vulnerable Code
               •   Phone ID Values




                       Code Flow                           Data Flow
Malware Detection
   Learn From Previous Mistakes

                                    Static
 Signatures                        Analysis
 Signatures                         Human
 Signatures
                                  Intelligence

                                   Dynamic
Basic Heuristics                   Analysis
Vulnerability Analysis
 Find the Flaws



          Environmental
              Flaws



  Application
    Flaws
Strategic Control Points
 Security and Power


   Application Markets
                         Enterprise Developers

   MDM                            Consumer Developers
                          Outsourced Developers
   Anti-Virus                        COTS Developers
                           … Developers
   Enterprise
Enterprise Fixes
  De-Risk B.Y.O.D




Policy

Process

Technical
  Controls
Consumer Fixes
     Will Users Learn?

Security Awareness
• Read EULAs & prompts..
• Understand permissions
• Know what jail breaking
  does to the security
  posture of the device
• Recognizing phishing and
  social engineering
• Practice practice practice
Permissions
  *SCOFF*




Just Let Me Fling Birds at Pigs Already!
Vendor Fixes
  It Takes a Village


         Verification

Process and Policy


     User Facing

         Platform Security
Developer Fixes
 Secure Coding



                  TRAINING
                    SDLC
                 AWARENESS
The Road Ahead
 Where do we go from here?




 Capabilities   Malware     Vulnerability    A Safer
              +           +               =
  Mapping       Detection     Analysis      Mobile Path
Sources
 Show me the data
•   http://www.juniper.net/us/en/local/pdf/additional-resources/7100155-en.pdf
      Juniper Network Trusted Mobility Index
•   http://countermeasures.trendmicro.eu/wp-content/uploads/2012/02/History-of-Mobile-Malware.pdf
      A History of Malware – Trend Micro
•   http://www.cs.berkeley.edu/~afelt/felt-mobilemalware-spsm.pdf
      A Survey of Mobile Malware In The Wild – UC Berkeley
•   http://www.securelist.com/en/analysis/204792222/Mobile_Malware_Evolution_Part_5
      Mobile Malware Evolution Part 5 – Kaspersky Labs
•   http://www.csc.ncsu.edu/faculty/jiang/pubs/OAKLAND12.pdf
      Dissecting Android Malware: Characterization and Evolution – Yajin Zhou and Xuxian Jiang
•   http://www.fiercemobilecontent.com/story/apples-new-ios-6-adds-deep-facebook-integration-dumps-google-
    maps/2012-06-11
      Apple's new iOS 6 adds deep Facebook integration, dumps Google Maps
•   http://www.net-security.org/secworld.php?id=13050
      LinkedIn Privacy Fail
•   http://www.trailofbits.com/resources/mobile_eip_2.pdf
      Mobile Exploit Intelligence Project – Trail of Bits
•   http://www.net-security.org/secworld.php?id=12418
      Social Mobile Apps Found Storing User’s Content Without Permission

•   And More…. Contact me if you need something specific I may have left out…

More Related Content

PDF
Survey of Rootkit Technologies and Their Impact on Digital Forensics
PPTX
CYBER INTELLIGENCE &amp; RESPONSE TECHNOLOGY
PDF
Slingshot APT - Critical Vulnerability through routers
PPTX
Defending Behind the Mobile Device
PPTX
Double guard
PDF
PDF
eForensics Free Magazine 01.12. teaser
PDF
IDS - Fact, Challenges and Future
Survey of Rootkit Technologies and Their Impact on Digital Forensics
CYBER INTELLIGENCE &amp; RESPONSE TECHNOLOGY
Slingshot APT - Critical Vulnerability through routers
Defending Behind the Mobile Device
Double guard
eForensics Free Magazine 01.12. teaser
IDS - Fact, Challenges and Future

What's hot (20)

PDF
CSF18 - For Your Ears Only - Sasha Kranjac
PPTX
Trend Micro - Targeted attacks: Have you found yours?
PPT
Day1
PDF
Cyber Security for Critical Infrastructure
PPTX
SCIT Labs - intrusion tolerant systems
PPT
Trend micro real time threat management press presentation
PPTX
Detecting and Confronting Flash Attacks from IoT Botnets
PPT
Safe Computing At Home And Work
PPT
Day4
PDF
Efficient String Matching Algorithm for Intrusion Detection
PDF
Moving target-defense
PPTX
Security assessment for financial institutions
PDF
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
PPTX
Targeted Attacks: Have you found yours?
PDF
Hakin9 interview w Prof Sood
PDF
DYNAMIC IDP SIGNATURE PROCESSING BY FAST ELIMINATION USING DFA
PPTX
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
PDF
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
PDF
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
CSF18 - For Your Ears Only - Sasha Kranjac
Trend Micro - Targeted attacks: Have you found yours?
Day1
Cyber Security for Critical Infrastructure
SCIT Labs - intrusion tolerant systems
Trend micro real time threat management press presentation
Detecting and Confronting Flash Attacks from IoT Botnets
Safe Computing At Home And Work
Day4
Efficient String Matching Algorithm for Intrusion Detection
Moving target-defense
Security assessment for financial institutions
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
Targeted Attacks: Have you found yours?
Hakin9 interview w Prof Sood
DYNAMIC IDP SIGNATURE PROCESSING BY FAST ELIMINATION USING DFA
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Ad

Viewers also liked (7)

PDF
Praetorian Veracode Webinar - Mobile Privacy
PDF
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
PDF
Avoiding the Pandora Pitfall
PPTX
Social and Mobile and Cloud - OH MY!
PDF
Shmoocon 2010 - The Monkey Steals the Berries
PPTX
Social Media Basics: Security Loopholes with Twitter & Other Social Media
PPT
Del Garabateo A La Escritura Convencional
Praetorian Veracode Webinar - Mobile Privacy
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
Avoiding the Pandora Pitfall
Social and Mobile and Cloud - OH MY!
Shmoocon 2010 - The Monkey Steals the Berries
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Del Garabateo A La Escritura Convencional
Ad

Similar to The New Mobile Landscape - OWASP Ireland (20)

PPTX
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
PDF
C0c0n 2011 mobile security presentation v1.2
PDF
Info security - mobile approach
PDF
Andrew Jaquith SOURCE Boston 2011
PDF
iScan Online - PCI DSS Mobile Task Force
PPT
Mobile Apps Security
PDF
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
PPT
Mobile code mining for discovery and exploits nullcongoa2013
PDF
Mobile Threats and Owasp Top 10 Risks
PDF
Social and Mobile and Cloud OH MY!
PPTX
Webinar on Enterprise Security & android
PDF
Dirty Little Secret - Mobile Applications Invading Your Privacy
PPTX
Security and Mobile Application Management with Worklight
PDF
Security In A Hybrid MAM and MDM World
PPTX
Mobile Application Security
PPTX
Mobile application securitry risks ISACA Silicon Valley 2012
PDF
Malware in Mobile Platform from Panoramic Industrial View
PDF
Mobile Application Security
PPT
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
PDF
M86 security predictions 2011
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
C0c0n 2011 mobile security presentation v1.2
Info security - mobile approach
Andrew Jaquith SOURCE Boston 2011
iScan Online - PCI DSS Mobile Task Force
Mobile Apps Security
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
Mobile code mining for discovery and exploits nullcongoa2013
Mobile Threats and Owasp Top 10 Risks
Social and Mobile and Cloud OH MY!
Webinar on Enterprise Security & android
Dirty Little Secret - Mobile Applications Invading Your Privacy
Security and Mobile Application Management with Worklight
Security In A Hybrid MAM and MDM World
Mobile Application Security
Mobile application securitry risks ISACA Silicon Valley 2012
Malware in Mobile Platform from Panoramic Industrial View
Mobile Application Security
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
M86 security predictions 2011

More from Tyler Shields (20)

PDF
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
PDF
Source Boston 2010 - The Monkey Steals the Berries Part Deux
PDF
Software Developers Forum 2010 - The Monkey Steals the Berries
PDF
Raleigh ISSA 2010 - The Monkey Steals the Berries
PDF
Static Detection of Application Backdoors
PDF
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
PDF
Anti-Debugging - A Developers View
PDF
Owasp Ireland - The State of Software Security
PDF
More Apps More Problems
PDF
IT Hot Topics - Mobile Security Threats at Every Layer
PDF
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
PDF
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
PPTX
IQT 2010 - The App Does That!?
PDF
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
PDF
GovCert.NL - The Monkey Steals The Berries
PPTX
Intelligence on the Intractable Problem of Software Security
PDF
The Coming Wave of Smartphone Attacks - Texas DIR
PPTX
CarolinaCon 2009 Anti-Debugging
PDF
CarolinaCon 2006 Reverse Engineering 101
PDF
CarolinaCon 2005 Web Application Hacking 101
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Software Developers Forum 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the Berries
Static Detection of Application Backdoors
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Anti-Debugging - A Developers View
Owasp Ireland - The State of Software Security
More Apps More Problems
IT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
IQT 2010 - The App Does That!?
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
GovCert.NL - The Monkey Steals The Berries
Intelligence on the Intractable Problem of Software Security
The Coming Wave of Smartphone Attacks - Texas DIR
CarolinaCon 2009 Anti-Debugging
CarolinaCon 2006 Reverse Engineering 101
CarolinaCon 2005 Web Application Hacking 101

Recently uploaded (20)

PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
SaaS reusability assessment using machine learning techniques
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Human Computer Interaction Miterm Lesson
MuleSoft-Compete-Deck for midddleware integrations
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
SGT Report The Beast Plan and Cyberphysical Systems of Control
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Build Real-Time ML Apps with Python, Feast & NoSQL
SaaS reusability assessment using machine learning techniques
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Build automations faster and more reliably with UiPath ScreenPlay
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Training Program for knowledge in solar cell and solar industry
Lung cancer patients survival prediction using outlier detection and optimize...
Advancing precision in air quality forecasting through machine learning integ...
A symptom-driven medical diagnosis support model based on machine learning te...
Human Computer Interaction Miterm Lesson

The New Mobile Landscape - OWASP Ireland

  • 1. Mobile Threats Things Your Smartphone Does When Nobody is Looking
  • 2. Agenda The “What” The Problem Mobile Ecosystem 1 2 3 4 Threat The Fix Landscape
  • 4. What Are The Risks Define the Threats
  • 5. Moving Into The Enterprise Bring Your Own Device Security Compliance Privacy
  • 6. Mobile Crossroads The Inflection Point 63% Do you trust the security of your mobile device… Have yet to make up their minds
  • 8. The Mobile Threat Landscape
  • 9. Mobile Malware Mobile Networks Decentralized Interconnected Mobile Quick Content Retrieval Perfect Malware Decentralized Interconnected Mobile Quick Content Retrieval
  • 11. Malware Timeline 2011 July August September October November Early to Malware Wave Exponential the Game Begins Growth
  • 12. Primary Target Android Most Targeted (65%) iOS Absent (<1%) WHY • Closed Technology 1% • Harder to Reverse Engineer 7% • Stronger OS Security 65% 27% • Better App Store Security • No Fragmentation Issue Android J2ME Symbian Windows Mobile Distribution of Mobile Threats by Platform 2011
  • 13. Mobile Malware 86% 7% Repackaging Update •Choose popular app •Similar to repackaging •Disassemble •Does not add full •Add malicious payloads payload •Re-assemble •Adds small downloader •Submit new app to •Payload downloaded at public market runtime Drive-By Standalone •Entice users to •Commercial spyware download malware •Non functional fake apps <1% 14% •Distributed via malicious (Fake Netflix) websites •Functional Trojan code •May or may not contain •Apps with root exploits a browser exploit
  • 14. Mobile Malware 37% Privilege Escalation •Attempts root exploits •Small number of platform vulnerabilities Remote Control •Similar to PC bots •Most use HTTP based web traffic as C&C 93% •May use more than one •Advanced C&C models exploit for attack translating from PC world •Advanced obfuscation seen in the wild Financial Charges Information Collection 45% •Premium rate SMS •Both hard-coded and runtime updated numbers •Employ SMS filtering •Harvests personal information and data •User accounts •GPS location 45% SMS •SMS and emails •Phone call tapping •Ad Libraries Phone Number
  • 15. Application Behaviors Previous Code Web Sources Your Code Binary 3rd Party Source 3rd Party Libraries Libraries
  • 16. Case studies … !
  • 17. Vulnerabilities • Sensitive data leakage (inadvertent or side channel) • Unsafe sensitive data storage • Unsafe sensitive data transmission • Hardcoded password/keys
  • 18. Vulnerabilities • Layered APIs on common languages • Blackberry and Android use Java as a base • Non-issue for Objective-C (it’s own language)
  • 20. The Mobile Ecosystem The Players of the Game Consumer
  • 21. MDM Vendors The Enterprise Choke Point Enterprise Control Point What They Provide Device Enrollment and Management Security Management Device Configuration Device Monitoring Software Management Security Components Passcode Enforcement Encryption Feature Restriction Compliance Locate and Wipe Certificate Management
  • 22. Mobile Anti-Virus Old Methods Rehashed Old Methods Rehashed What They Provide Quarantine and Eradicate Malware Signature Based Analysis Security Components Locate, Lock, and Wipe Cloud Analysis Spam Filtering Email Attachment Scanning Data Backup
  • 23. Application Markets The Distributor The Distributor What They Provide Marketplace for Applications User Ratings Application Updates Security Components Application Approval Process Android Bouncer iOS Scanning
  • 24. Developers The Source The Source What They Provide Enterprise Application Development Consumer Application Development Cross-platform Expertise Security Components Variable on Developer Capabilities
  • 26. The Fix Securing Against Multiple Threats Capabilities Mapping Malware Detection Vulnerability Analysis
  • 27. Capabilities Mapping Features and Permissions Data Sources Data Sinks Mapping • Location Data • HTTP Requests User Facing • Contacts • Outbound SMS • Email • Outbound Email • Trace Sources to Sinks • SMS Data • DNS Requests • Application “Intent” • SQL Access • TCP • Permission Mapping • File System • UDP • Human Intelligence • Photos • Vulnerable Code • Phone ID Values Code Flow Data Flow
  • 28. Malware Detection Learn From Previous Mistakes Static Signatures Analysis Signatures Human Signatures Intelligence Dynamic Basic Heuristics Analysis
  • 29. Vulnerability Analysis Find the Flaws Environmental Flaws Application Flaws
  • 30. Strategic Control Points Security and Power Application Markets Enterprise Developers MDM Consumer Developers Outsourced Developers Anti-Virus COTS Developers … Developers Enterprise
  • 31. Enterprise Fixes De-Risk B.Y.O.D Policy Process Technical Controls
  • 32. Consumer Fixes Will Users Learn? Security Awareness • Read EULAs & prompts.. • Understand permissions • Know what jail breaking does to the security posture of the device • Recognizing phishing and social engineering • Practice practice practice
  • 33. Permissions *SCOFF* Just Let Me Fling Birds at Pigs Already!
  • 34. Vendor Fixes It Takes a Village Verification Process and Policy User Facing Platform Security
  • 35. Developer Fixes Secure Coding TRAINING SDLC AWARENESS
  • 36. The Road Ahead Where do we go from here? Capabilities Malware Vulnerability A Safer + + = Mapping Detection Analysis Mobile Path
  • 37. Sources Show me the data • http://www.juniper.net/us/en/local/pdf/additional-resources/7100155-en.pdf Juniper Network Trusted Mobility Index • http://countermeasures.trendmicro.eu/wp-content/uploads/2012/02/History-of-Mobile-Malware.pdf A History of Malware – Trend Micro • http://www.cs.berkeley.edu/~afelt/felt-mobilemalware-spsm.pdf A Survey of Mobile Malware In The Wild – UC Berkeley • http://www.securelist.com/en/analysis/204792222/Mobile_Malware_Evolution_Part_5 Mobile Malware Evolution Part 5 – Kaspersky Labs • http://www.csc.ncsu.edu/faculty/jiang/pubs/OAKLAND12.pdf Dissecting Android Malware: Characterization and Evolution – Yajin Zhou and Xuxian Jiang • http://www.fiercemobilecontent.com/story/apples-new-ios-6-adds-deep-facebook-integration-dumps-google- maps/2012-06-11 Apple's new iOS 6 adds deep Facebook integration, dumps Google Maps • http://www.net-security.org/secworld.php?id=13050 LinkedIn Privacy Fail • http://www.trailofbits.com/resources/mobile_eip_2.pdf Mobile Exploit Intelligence Project – Trail of Bits • http://www.net-security.org/secworld.php?id=12418 Social Mobile Apps Found Storing User’s Content Without Permission • And More…. Contact me if you need something specific I may have left out…