메뉴 건너뛰기




Volumn , Issue , 2008, Pages 225-238

Behavioral detection of malware on mobile handsets

Author keywords

Machine learning; Mobile handsets; Security; Worm detection

Indexed keywords

APPLICATIONS; COMPUTER CRIME; COMPUTER OPERATING SYSTEMS; COMPUTER WORMS; DIESEL ENGINES; LEARNING SYSTEMS; MICROORGANISMS; MOBILE DEVICES; MOBILE TELECOMMUNICATION SYSTEMS; PORTABLE EQUIPMENT; SHELTERS (FROM ATTACK); SUPPORT VECTOR MACHINES; TELECOMMUNICATION EQUIPMENT; TELEPHONE SETS; VIDEO STREAMING; VIRUSES;

EID: 57349125651     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1378600.1378626     Document Type: Conference Paper
Times cited : (201)

References (54)
  • 1
    • 57349142190 scopus 로고    scopus 로고
    • Rootkitrevealer 1.71. http://technet.microsoft.com/enus/sysinternals/ bb897445.aspx.
    • Rootkitrevealer 1.71. http://technet.microsoft.com/enus/sysinternals/ bb897445.aspx.
  • 3
    • 0026953373 scopus 로고
    • The esterel synchronous programming language: Design, semantics, implementation
    • G. Berry and G. Gonthier. The esterel synchronous programming language: Design, semantics, implementation. Science of Computer Programming, 19(2):87-152, 1992.
    • (1992) Science of Computer Programming , vol.19 , Issue.2 , pp. 87-152
    • Berry, G.1    Gonthier, G.2
  • 4
    • 50049087364 scopus 로고    scopus 로고
    • On mobile viruses exploiting messaging and Bluetooth services
    • A. Bose and K. G. Shin. On mobile viruses exploiting messaging and Bluetooth services. Secure Comm, 2006.
    • (2006) Secure Comm
    • Bose, A.1    Shin, K.G.2
  • 10
    • 57349103430 scopus 로고    scopus 로고
    • S. Corp. Symantec internet security threat report trends. http://www.symantec.com/business/theme.jsp?themeid=threatreport.
    • S. Corp. Symantec internet security threat report trends. http://www.symantec.com/business/theme.jsp?themeid=threatreport.
  • 11
    • 57349136916 scopus 로고    scopus 로고
    • K. Corporation. Kaspersky Anti-Virus Mobile. http://usa.kaspersky. com/products-services/antivirusmobile.php.
    • K. Corporation". Kaspersky Anti-Virus Mobile. http://usa.kaspersky. com/products-services/antivirusmobile.php.
  • 15
    • 57349144092 scopus 로고    scopus 로고
    • F-secure. Cabir. http://www.f-secure.com/v-descs/cabir.shtml.
    • F-secure. Cabir
  • 16
    • 57349085352 scopus 로고    scopus 로고
    • F-secure. Lasco. http://www.f-secure.com/v-descs/lasco-a.shtml.
    • F-secure. Lasco
  • 23
    • 1642375563 scopus 로고    scopus 로고
    • Adaptive model generation:: An architecture for the deployment of data minig-based intrusion detection systems
    • A. Honig, A. Howard, E. Eskin, and S. Stolfo. Adaptive model generation:: An architecture for the deployment of data minig-based intrusion detection systems. Data Mining for Security Applications, 2002.
    • (2002) Data Mining for Security Applications
    • Honig, A.1    Howard, A.2    Eskin, E.3    Stolfo, S.4
  • 25
    • 57349108350 scopus 로고    scopus 로고
    • T. M. Incorporated. Trend Micro mobile security. http://www.trendmicro. com/en/products/mobile/tmms/, 2006.
    • T. M. Incorporated. Trend Micro mobile security. http://www.trendmicro. com/en/products/mobile/tmms/, 2006.
  • 26
    • 0002714543 scopus 로고    scopus 로고
    • Making large-scale support vector machine learning practical
    • B. Scholkopf, C. Burges, and A. Smola, editors, MIT Press, Cambridge, MA
    • T. Joachims. Making large-scale support vector machine learning practical. In B. Scholkopf, C. Burges, and A. Smola, editors, Advances in Kernel Methods: Support Vector Machines. MIT Press, Cambridge, MA, 1998.
    • (1998) Advances in Kernel Methods: Support Vector Machines
    • Joachims, T.1
  • 27
    • 57349185287 scopus 로고    scopus 로고
    • Y Kaplan. Api spying techniques for windows 9x, nt and 2000. http://www.internals.com/articles/apispy/apispy.htm.
    • Y Kaplan. Api spying techniques for windows 9x, nt and 2000. http://www.internals.com/articles/apispy/apispy.htm.
  • 29
    • 34548853976 scopus 로고    scopus 로고
    • The wireless epidemic
    • September
    • J. Kleinberg. The wireless epidemic. Nature, 449(20):287-288, September 2007.
    • (2007) Nature , vol.449 , Issue.20 , pp. 287-288
    • Kleinberg, J.1
  • 30
    • 57349145977 scopus 로고    scopus 로고
    • Mobile malware
    • K. Lab. Kaspersky security bulletin 2006: Mobile malware. http://www.viruslist.com/en/analysis?pubid=204791922.
    • (2006) Kaspersky security bulletin
    • Lab, K.1
  • 33
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • L. Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7):558-565, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 36
    • 33750334282 scopus 로고    scopus 로고
    • Testing and evaluating virus detectors for handheld devices
    • November
    • J. A. Morales, P. J. Clarke, Y. Deng, and B. M. G. Kibria. Testing and evaluating virus detectors for handheld devices. Journal in Computer Virology, 2(2):135-147, November 2006.
    • (2006) Journal in Computer Virology , vol.2 , Issue.2 , pp. 135-147
    • Morales, J.A.1    Clarke, P.J.2    Deng, Y.3    Kibria, B.M.G.4
  • 38
    • 19044368297 scopus 로고    scopus 로고
    • Temporal logic of causal knowledge
    • W. Penczek. Temporal logic of causal knowledge. Proc. of WoLLiC, 98, 1998.
    • (1998) Proc. of WoLLiC , vol.98
    • Penczek, W.1
  • 46
    • 38149001240 scopus 로고    scopus 로고
    • T. Lee and J.J. Mody. Behavioral classification. http://www.microsoft. com/downloads/details.aspx?FamilyID=7b5d8cc8-b336-4091 -abb5-2cc500a6c41 a&displaylang=en, 2006.
    • (2006) Behavioral classification
    • Lee, T.1    Mody, J.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.