||Nowadays we use a variety of applications on mobile phones or personal computers, and the probability of malware embedding is growing high. If there is not any robust prevention in the future, botnet will penetrate, and then manipulate the user’s mobile phones or computers and seize the authority of control. Mobile phones brought us much convenience, but also the safety of the use on it has been received more attention. In real world, because of the difference of application scenarios, the security mechanism on a personal computer in the past, although some may be directly applied, most likely seems to be no avail in smart phones, for the purpose of use as well as on different architecture.|
Smart phones (broadly speaking, mobile smart devices) in modern society play an important role. With the applications on the network, smart phones bring the convenience, but also led to many related security issues. This paper presents a possible way, CIDP Treatment, to achieve the control of a mobile botnet by using caller ID numbers as an innovative covert channel. We design an innovative lossless data compression treatment -- Perfect Octave Coding (P8 Coding) for this new covert channel to enhance the efficiency of the data transmission.
|| Yuanyuan Zeng, Kang G. Shin and Xin Hu. Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets. The University of Michigan. 2010. Technical Report .|
 Schipka, Maksym. Dollars for downloading. Network Security. January 2009, Vol. 2009, 1, pp. 7-11.
 Consequences of Botnets Spreading to Mobile Devices. Anne Ruste Flø, Audun Jøsang. Oslo : s.n., 2009. the 14th Nordic Conference on Secure IT Systems (NordSec 2009).
 Mustaque Ahamad, Dave Amster. Emerging Cyber Threats Report for 2009. Georgia Tech Information Security Center (GTISC). 2008.
 Mulliner, Collin. Smartphone Botnets. 2010.
 Symbian worm Yxes: Towards mobile botnets ? Apvrille, Axelle. 2010. EICAR 2010.
 Evaluating Bluetooth as a Medium for Botnet Command and Control. Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor and Wenke Lee. Springer-Verlag Berlin, Heidelberg : s.n., 2010. DIMVA'10 Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment. 3-642-14214-1 978-3-642-14214-7.
 Injecting SMS Messages into Smart Phones for Security Analysis. Collin Mulliner, Charlie Miller. 2009. WOOT'09 Proceedings of the 3rd USENIX conference on Offensive technologies .
 Rise of the iBots: 0wning a telco network. Seifert, Collin Mulliner and Jean-Pierre. Nancy, France : s.n., 2010. In the Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software (Malware).
 Perez, Sarah. More DroidDream Details Emerge: It was Building a Mobile Botnet. www.readwriteweb.com. [Online] March 7, 2011. http://www.readwriteweb.com/archives/droiddream_malware_was_going_to_install_more_apps_on_your_phone.php.
 Wenke Lee, Cliff Wang, David Dagon, [ed.]. Botnet Detection-Countering the Largest Security Threat. s.l. : Springer, 2008.
 A Survey of Botnet and Botnet Detection. Maryam Feily, Alireza Shahrestani, Sureswaran Ramadass. 2009. 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
 A Framework for P2P Botnets. Su Chang, Linfeng Zhang, Yong Guan, Thomas E. Daniels. 2009. 2009 International Conference on Communications and Mobile Computing.
 A Taxonomy of Botnets. David Dagon, Guofei Gu, Cliff Zou, Julian Grizzard, Sanjeev Dwivedi, Wenke Lee, Richard Lipton. 2005. Proceedings of CAIDA DNS-OARC Workshop.
 Sebastian Zander, Grenville Armitage, Philip Branch. Covert Channels and Countermeasures in Computer Network Protocols. [ed.] Nelson L. S. da Fonseca. IEEE Communications Surveys & Tutorials. 10 December 2007, December 2007, Vol. 45, 12, pp. 136 - 142 .