{"47356":{"#nid":"47356","#data":{"type":"news","title":"Researchers Work to Improve Mobile Device \u0026 Cellular Network Security","body":[{"value":"\u003Cp\u003ESmart phones -- like BlackBerrys and iPhones -- have become indispensable to today\u0027s highly mobile workforce and tech-savvy youngsters. While these devices keep friends and colleagues just a few thumb-taps away, they also pose new security and privacy risks. \u003C\/p\u003E\n\u003Cp\u003E\u0022Traditional cell phones have been ignored by attackers because they were specialty devices, but the new phones available today are handheld computers that are able to send and receive e-mail, surf the Internet, store documents and remotely access data -- all actions that make them vulnerable to a wide range of attacks,\u0022 said Patrick Traynor, assistant professor in the School of Computer Science at the Georgia Institute of Technology.\n\u003C\/p\u003E\n\u003Cp\u003ETraynor and Jonathon Giffin, also an assistant professor in the School of Computer Science, recently received a three-year $450,000 grant from the National Science Foundation to develop tools that improve the security of mobile devices and the telecommunications networks on which they operate. These Georgia Tech faculty, together with a team of graduate students, are developing methods of identifying and remotely repairing mobile devices that may be infected with viruses or other malware.\n\u003C\/p\u003E\n\u003Cp\u003EMalware can potentially eavesdrop on user input or otherwise steal sensitive information, destroy stored information, or disable a device. Attackers may snoop on passwords for online accounts, electronic documents, e-mails that discuss sensitive topics, calendar and phonebook entries, and audio and video media.\u003C\/p\u003E\n\u003Cp\u003E\u0022Since mobile phones typically lack security features found on desktop computers, such as antivirus software, we need to accept that the mobile devices will ultimately be successfully attacked. Therefore our research focus is to develop effective attack recovery strategies,\u0022 explained Giffin.\n\u003C\/p\u003E\n\u003Cp\u003EThe researchers plan to investigate whether cellular service providers -- such as AT\u0026amp;T and Verizon Wireless -- are capable of detecting infected devices on their respective networks. Since infected devices often begin to over-utilize the network by sending a high volume of traffic to a known malicious Internet server or by suddenly generating a high volume of text messages, monitoring traffic patterns on the network should allow these infected phones to be located, according to the researchers.\n\u003C\/p\u003E\n\u003Cp\u003E\u0022While a single user might realize that a phone is behaving differently, that person probably won\u0027t know why. But a cell phone provider may see a thousand devices behaving in the same way and have the ability to do something about it,\u0022 said Traynor.\n\u003C\/p\u003E\n\u003Cp\u003EOnce infected devices are located, those phones will need to be cleared of the malicious code. To accomplish this, the researchers are developing remote repair methods, which will allow service providers to assist in the cleaning of infected devices without requiring that the phones be brought to a service center. The methods will also have to work without much effort on the part of the customer.\u003C\/p\u003E\n\u003Cp\u003EThis repair may require disabling some functionality on the phone, such as the ability to use downloaded programs, until the malicious program is located and removed. While the repair is underway, phone calling and text messaging functionality would continue to operate.\n\u003C\/p\u003E\n\u003Cp\u003E\u0022Using this remote repair strategy, the service provider no longer has to completely disable a phone. Instead they just put the device into a safe, but reduced, mode until the malware can be removed,\u0022 said Giffin.\n\u003C\/p\u003E\n\u003Cp\u003ETo assess their proposed methods of finding and repairing infected mobile devices, the researchers plan to build a cellular network test bed at Georgia Tech that will simulate how cellular devices communicate over a network.\n\u003C\/p\u003E\n\u003Cp\u003E\u0022We hope that developing these attack recovery strategies will let potential mobile phone and network attackers know that these response mechanisms are in place, ultimately making their attacks far less widespread or successful,\u0022 said Traynor.\n\u003C\/p\u003E\n\u003Cp\u003EThis material is based upon work supported by the National Science Foundation (NSF) under Award No. CNS-0916047. Any opinions, findings, conclusions or recommendations expressed in this publication are those of the researchers and do not necessarily reflect the views of the NSF.\n\u003C\/p\u003E\n\u003Cp\u003E\u003Cstrong\u003EResearch News \u0026amp; Publications Office\u003Cbr \/\u003E\nGeorgia Institute of Technology\u003Cbr \/\u003E\n75 Fifth Street, N.W., Suite 100\u003Cbr \/\u003E\nAtlanta, Georgia  30308  USA\n\u003C\/strong\u003E\u003C\/p\u003E\n\u003Cp\u003EMedia Relations Contacts: Abby Vogel (404-385-3364); E-mail: (\u003Ca href=\u0022mailto:avogel@gatech.edu\u0022\u003Eavogel@gatech.edu\u003C\/a\u003E) or John Toon (404-894-6986); E-mail: (\u003Ca href=\u0022mailto:jtoon@gatech.edu\u0022\u003Ejtoon@gatech.edu\u003C\/a\u003E).\n\u003C\/p\u003E\n\u003Cp\u003E\u003Cstrong\u003EWriter:\u003C\/strong\u003E Abby Vogel\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"Georgia Tech computer science faculty members recently received a National Science Foundation grant to develop tools that improve the security of mobile devices and the telecommunications networks on which they operate.","format":"limited_html"}],"field_summary_sentence":[{"value":"A new NSF grant will help improve mobile device \u0026 network securi"}],"uid":"27206","created_gmt":"2009-11-10 01:00:00","changed_gmt":"2016-10-08 03:02:51","author":"Abby Vogel Robinson","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2009-11-10T00:00:00-05:00","iso_date":"2009-11-10T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"47357":{"id":"47357","type":"image","title":"Patrick Traynor Jon Giffin","body":null,"created":"1449175107","gmt_created":"2015-12-03 20:38:27","changed":"1475894442","gmt_changed":"2016-10-08 02:40:42","alt":"Patrick Traynor Jon Giffin","file":{"fid":"101194","name":"txz61066.jpg","image_path":"\/sites\/default\/files\/images\/txz61066_0.jpg","image_full_path":"http:\/\/tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/txz61066_0.jpg","mime":"image\/jpeg","size":1257434,"path_740":"http:\/\/tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/txz61066_0.jpg?itok=lZWYZPc9"}},"47358":{"id":"47358","type":"image","title":"Traynor Giffin smart phones","body":null,"created":"1449175107","gmt_created":"2015-12-03 20:38:27","changed":"1475894442","gmt_changed":"2016-10-08 02:40:42","alt":"Traynor Giffin smart phones","file":{"fid":"101195","name":"txr61066.jpg","image_path":"\/sites\/default\/files\/images\/txr61066_0.jpg","image_full_path":"http:\/\/tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/txr61066_0.jpg","mime":"image\/jpeg","size":1234162,"path_740":"http:\/\/tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/txr61066_0.jpg?itok=aAWovdJz"}},"47359":{"id":"47359","type":"image","title":"Georgia Tech computer scientists","body":null,"created":"1449175107","gmt_created":"2015-12-03 20:38:27","changed":"1475894442","gmt_changed":"2016-10-08 02:40:42","alt":"Georgia Tech computer scientists","file":{"fid":"101196","name":"tki61066.jpg","image_path":"\/sites\/default\/files\/images\/tki61066_0.jpg","image_full_path":"http:\/\/tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/tki61066_0.jpg","mime":"image\/jpeg","size":1415113,"path_740":"http:\/\/tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/tki61066_0.jpg?itok=yWsz6eQ7"}}},"media_ids":["47357","47358","47359"],"related_links":[{"url":"http:\/\/www.cc.gatech.edu\/~traynor\/","title":"Patrick Traynor"},{"url":"http:\/\/www.cc.gatech.edu\/~giffin\/index.shtml","title":"Jonathon Giffin"},{"url":"http:\/\/www.cc.gatech.edu\/inside\/units\/cs","title":"College of Computing\\\u0027s School of Computer Science"},{"url":"http:\/\/www.cc.gatech.edu\/","title":"College of Computing"}],"groups":[{"id":"1188","name":"Research Horizons"}],"categories":[{"id":"139","name":"Business"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"143","name":"Digital Media and Entertainment"},{"id":"145","name":"Engineering"},{"id":"135","name":"Research"}],"keywords":[{"id":"1293","name":"cell phone"},{"id":"7770","name":"cellular"},{"id":"7772","name":"malware"},{"id":"7771","name":"mobile phone"},{"id":"1385","name":"network"},{"id":"7773","name":"remote repair"},{"id":"167055","name":"security"},{"id":"168908","name":"smartphone"},{"id":"1463","name":"Telecommunications"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cstrong\u003EAbby Vogel\u003C\/strong\u003E\u003Cbr \/\u003EResearch News and Publications\u003Cbr \/\u003E\u003Ca href=\u0022http:\/\/www.gatech.edu\/contact\/index.html?id=avogel6\u0022\u003EContact Abby Vogel\u003C\/a\u003E\u003Cbr \/\u003E\u003Cstrong\u003E404-385-3364\u003C\/strong\u003E","format":"limited_html"}],"email":["avogel@gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}