Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS
Content archived on 2024-06-18

Active Behaviour Demands Active Security: New Approaches to Mobile Device Security

Objective

As mobile devices are increasingly used in day-to-day tasks involving sensitive information, authentication and money, they are becoming attractive targets for attackers. Recent attacks against mobile devices have succeeded in leaking the sensitive information stored on the device and have provided attackers financial gain through the unauthorized use of phone and messaging services.

While the current state-of-the-art is designed with security in mind and provides a level of protection they are static and have a major assumption: every user will download applications from the ‘official app store’ in which, submitted applications are statically checked and validated prior to being admitted. The app store validation is mainly based on permission checks and code verification prior to installation. However, once the application passes and makes its way to the user’s mobile device, no further security checks occur. This leaves the users open for sophisticated attacks involving various data leak cases or the interaction of existing applications on the device.

Therefore, ACTIVMOBSEC proposes an active approach based on user and application behaviour modelling, similar but not identical to anomaly detection, for detecting the behaviour changes on the device. The main challenge is to differentiate between legitimate changes (i.e. software updates) and the malicious acts such as device theft, malware infection or data leaks. To this end, ACTIMOBSEC aims to improve the user awareness and provide clear and concise information on the device state. Furthermore, a user centric validation technique will be investigated to provide a way for only the legitimate user to train his/her device while the malicious use and users will cause the device to operate in a defensive state, preventing access to sensitive data and functions.

Fields of science (EuroSciVoc)

CORDIS classifies projects with EuroSciVoc, a multilingual taxonomy of fields of science, through a semi-automatic process based on NLP techniques. See: The European Science Vocabulary.

You need to log in or register to use this function

Topic(s)

Calls for proposals are divided into topics. A topic defines a specific subject or area for which applicants can submit proposals. The description of a topic comprises its specific scope and the expected impact of the funded project.

Call for proposal

Procedure for inviting applicants to submit project proposals, with the aim of receiving EU funding.

FP7-PEOPLE-2011-IIF
See other projects for this call

Funding Scheme

Funding scheme (or “Type of Action”) inside a programme with common features. It specifies: the scope of what is funded; the reimbursement rate; specific evaluation criteria to qualify for funding; and the use of simplified forms of costs like lump sums.

MC-IIF - International Incoming Fellowships (IIF)

Coordinator

THE GLASGOW CALEDONIAN UNIVERSITY
EU contribution
€ 200 371,80
Address
Cowcaddens Road, City Campus 70
G4 0BA Glasgow
United Kingdom

See on map

Activity type
Higher or Secondary Education Establishments
Links
Total cost

The total costs incurred by this organisation to participate in the project, including direct and indirect costs. This amount is a subset of the overall project budget.

No data
My booklet 0 0