메뉴 건너뛰기




Volumn , Issue , 2007, Pages 199-206

On the effort to create smartphone worms in windows mobile

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; CONTROL THEORY; MILITARY DATA PROCESSING; MOBILE DEVICES; SIGNAL ENCODING; SOFTWARE ENGINEERING; TARGETS; TELECOMMUNICATION EQUIPMENT; WINDOWS;

EID: 48749129898     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAW.2007.381933     Document Type: Conference Paper
Times cited : (18)

References (23)
  • 1
    • 48749121111 scopus 로고    scopus 로고
    • C. Peikari, S. Fogie, and Ratter/29A, Details Emerge on the First Windows Mobile Virus, September 2004. http://www.informit.com/articles/ article.asp?p=337071.
    • C. Peikari, S. Fogie, and Ratter/29A, "Details Emerge on the First Windows Mobile Virus," September 2004. http://www.informit.com/articles/ article.asp?p=337071.
  • 2
    • 48749086973 scopus 로고    scopus 로고
    • C. Peikari, S. Fogie, Ratter/29A, and J. Read, Reverse-Engineering the First Pocket PC Trojan, Oct. 2004. http://www.informit.com/articles/ article.asp?p=340544.
    • C. Peikari, S. Fogie, Ratter/29A, and J. Read, "Reverse-Engineering the First Pocket PC Trojan," Oct. 2004. http://www.informit.com/articles/ article.asp?p=340544.
  • 5
    • 48749101868 scopus 로고    scopus 로고
    • Voraussetzungen für die Entwicklung von Malware unter Windows Mobile 5,
    • Diploma thesis, RWTH Aachen, Feb, in German
    • B. Leidner, "Voraussetzungen für die Entwicklung von Malware unter Windows Mobile 5," Diploma thesis, RWTH Aachen, Feb. 2007. (in German); http://pi1.informatik.uni-mannheim.de/filepool/theses/diplomarbeit- 2007-leidner.pdf.
    • (2007)
    • Leidner, B.1
  • 6
    • 33750436929 scopus 로고    scopus 로고
    • About malicious software in smartphones
    • S. Töyssy and M. Helenius, "About malicious software in smartphones," Journal in Computer Virology, vol. 2, no. 2, pp. 109-119, 2006.
    • (2006) Journal in Computer Virology , vol.2 , Issue.2 , pp. 109-119
    • Töyssy, S.1    Helenius, M.2
  • 8
    • 48749128533 scopus 로고    scopus 로고
    • san@xfocus.org, Hacking Windows CE, Phrack Magazin, 6, July 2005. http://www.phrack.org/archives/63/p63-0x06_Hacking_WindowsCE. txt.
    • san@xfocus.org, "Hacking Windows CE," Phrack Magazin, vol. 6, July 2005. http://www.phrack.org/archives/63/p63-0x06_Hacking_WindowsCE. txt.
  • 9
    • 48749098536 scopus 로고    scopus 로고
    • C. Mulliner, Exploiting PocketPC. What The Hack 2005, Netherlands, July 2005. Slides at http://wiki.whatthehack.org/images/c/c0/ Collinmulliner_wth2005_exploiting_pocketpc.pdf.
    • C. Mulliner, "Exploiting PocketPC." What The Hack 2005, Netherlands, July 2005. Slides at http://wiki.whatthehack.org/images/c/c0/ Collinmulliner_wth2005_exploiting_pocketpc.pdf.
  • 10
    • 48749121429 scopus 로고    scopus 로고
    • S. Fogie, Reverse Engineering Mobile Binaries. DEF CON 11, Las Vegas, USA, Aug. 2003. Slides at http://www.airscanner.com/pubs/fogieDC11. pdf.
    • S. Fogie, "Reverse Engineering Mobile Binaries." DEF CON 11, Las Vegas, USA, Aug. 2003. Slides at http://www.airscanner.com/pubs/fogieDC11. pdf.
  • 12
    • 0031123773 scopus 로고    scopus 로고
    • A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
    • E. Jonsson and T. Olovsson, "A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior," IEEE Trans. Softw. Eng., vol. 23, no. 4, pp. 235-245, 1997.
    • (1997) IEEE Trans. Softw. Eng , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 14
    • 0012112708 scopus 로고    scopus 로고
    • Addison-Wesley Professional, second edition ed, June
    • D. Seal, ARM Architecture Reference Manual. Addison-Wesley Professional, second edition ed., June 2000.
    • (2000) ARM Architecture Reference Manual
    • Seal, D.1
  • 15
    • 48749111806 scopus 로고    scopus 로고
    • GNU.org homepage
    • "GNU.org homepage." http://www.gnu.org.
  • 16
    • 48749087528 scopus 로고    scopus 로고
    • The Metasploit Project
    • "The Metasploit Project." http://www.metasploit.org.
  • 18
    • 48749084542 scopus 로고    scopus 로고
    • CeGCC's web page
    • "CeGCC's web page." http://cegcc.berlios.de/.
  • 19
    • 48749111540 scopus 로고
    • Protocol Standard for a NetBIOS Service on a TCP/UDP Transport: Concepts and Methods, RFC 1001
    • Network Working Group, Mar
    • "Protocol Standard for a NetBIOS Service on a TCP/UDP Transport: Concepts and Methods, RFC 1001," in Request for Comments, Network Working Group, Mar. 1987. http://www.faqs.org/rfcs/rfc1001.html.
    • (1987) Request for Comments
  • 22
    • 38049018397 scopus 로고    scopus 로고
    • Compiler security checks in depth
    • Feb, VS.71.aspx
    • B. Bray, "Compiler security checks in depth," Feb. 2002. http://msdn2.microsoft.com/en-us/library/aa290051(VS.71).aspx.
    • (2002)
    • Bray, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.