메뉴 건너뛰기




Volumn 7, Issue 5, 2009, Pages 70-74

Wireless malware propagation: A reality check

Author keywords

Attack trends; Attackers; Bluetooth; Malware; Wi Fi

Indexed keywords

ATTACK TRENDS; ATTACKERS; MALWARE; MALWARE PROPAGATION; MALWARES; SECURITY ATTACKS; WIRELESS COMMUNICATIONS;

EID: 70350136704     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2009.142     Document Type: Article
Times cited : (20)

References (12)
  • 1
    • 34047180005 scopus 로고    scopus 로고
    • Studying bluetooth malware propagation: The blue-bag project
    • L. Carettoni, C. Merloni, and S. Zanero, "Studying Bluetooth Malware Propagation: The Blue-bag Project," IEEE Security & Pri-vacy, vol.5, no.2, 2007, pp. 17-25.
    • (2007) IEEE Security & Pri-vacy , vol.5 , Issue.2 , pp. 17-25
    • Carettoni, L.1    Merloni, C.2    Zanero, S.3
  • 2
    • 46049100524 scopus 로고    scopus 로고
    • Warkitting: The drive-by subversion of wireless home routers
    • A. Tsow et al., "Warkitting: The Drive-by Subversion of Wireless Home Routers," J. Digital Foren-sic Practice, vol.1, no.3, 2006, pp. 179-192.
    • (2006) J. Digital Foren-sic Practice , vol.1 , Issue.3 , pp. 179-192
    • Tsow, A.1
  • 3
    • 50249088136 scopus 로고    scopus 로고
    • Proxim-ity breeds danger: Emerging threats in metro-area wireless networks
    • Usenix Assoc
    • P. Akritidis et al., "Proxim-ity Breeds Danger: Emerging Threats in Metro-Area Wireless Networks," Proc. 16th Usenix Se-curity Symposium, Usenix Assoc., 2007, pp. 1-16.
    • (2007) Proc. 16th Usenix Se-curity Symposium , pp. 1-16
    • Akritidis, P.1
  • 4
    • 60849108674 scopus 로고    scopus 로고
    • WiFi networks and malware epidemiology
    • H. Hu et al., "WiFi Networks and Malware Epidemiology," Proc. National Academy of Sciences, vol.106, no.5, 2009, pp. 1318-1323.
    • (2009) Proc. National Academy of Sciences , vol.106 , Issue.5 , pp. 1318-1323
    • Hu, H.1
  • 5
    • 38149086751 scopus 로고    scopus 로고
    • Drive-by pharming
    • Information and Communication Security, Springer- Verlag
    • S. Stamm, Z. Ramzan, and M. Jakobsson, "Drive-By Pharming," Information and Communication Security, LNCS 4861, Springer- Verlag, 2008, pp. 495-506.
    • (2008) LNCS 4861 , pp. 495-506
    • Stamm, S.1    Ramzan, Z.2    Jakobsson, M.3
  • 6
    • 38549101578 scopus 로고    scopus 로고
    • Breaking 104-bit WEP in Less than 60 seconds
    • Information Security Applications, Springer-Verlag
    • E. Tews, R.P. Weinmann, and A. Pyshkin, "Breaking 104-bit WEP in Less than 60 Seconds," Information Security Applications, LNCS 4867, Springer-Verlag, 2008, pp. 188-202.
    • (2008) LNCS 4867 , pp. 188-202
    • Tews, E.1    Weinmann, R.P.2    Pyshkin, A.3
  • 7
    • 34547218865 scopus 로고    scopus 로고
    • A preliminary In-vestigation of worm infections in a bluetooth environment
    • ACM Press
    • J. Su et al., "A Preliminary In-vestigation of Worm Infections in a Bluetooth Environment," Proc. 4th ACM Workshop on Recur-ring Malcode (WORM 06), ACM Press, 2006, pp. 9-16.
    • (2006) Proc. 4th ACM Workshop on Recur-ring Malcode (WORM 06) , pp. 9-16
    • Su, J.1
  • 9
    • 58849141571 scopus 로고    scopus 로고
    • Mod-eling propagation dynamics of bluetooth worms
    • G. Yan and S. Eidenbenz, "Mod-eling Propagation Dynamics of Bluetooth Worms," IEEE Trans. Mobile Computing, vol.8, no.3, 2009, pp. 353-368.
    • (2009) IEEE Trans. Mobile Computing , vol.8 , Issue.3 , pp. 353-368
    • Yan, G.1    Eidenbenz, S.2
  • 10
    • 44649187943 scopus 로고    scopus 로고
    • Is It Finally Time to Worry about Mobile Malware?
    • G. Lawton, "Is It Finally Time to Worry about Mobile Malware?" Computer, vol.41, no.5, 2008, pp. 12-14.
    • (2008) Computer , vol.41 , Issue.5 , pp. 12-14
    • Lawton, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.