메뉴 건너뛰기




Volumn , Issue , 2009, Pages 83-90

Designing system-level defenses against cellphone malware

Author keywords

Cellphone malware; Graphic turing test; Mandatory access control

Indexed keywords

BATTERY POWER; CELL PHONE; DESIGNING SYSTEMS; FALSE POSITIVE; GRAPHIC TURING TESTS; MALICIOUS CODES; MALICIOUS TRAFFIC; MALWARES; MANDATORY ACCESS CONTROL; NEW PROCESS; PROGRAM FLOW; SECURITY DOMAINS; SECURITY THREATS; SMARTPHONES; SYMBIAN; SYSTEM LEVELS;

EID: 74949101283     PISSN: 10609857     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SRDS.2009.21     Document Type: Conference Paper
Times cited : (34)

References (40)
  • 1
    • 84868075331 scopus 로고    scopus 로고
    • "http://www.us-cert.gov/pressroom/trendsandanalysisq108.pdf, ".
  • 6
    • 84868071125 scopus 로고    scopus 로고
    • "http://www.idc.com/getdoc.jsp?containerid=206072, ".
  • 7
    • 84868054820 scopus 로고    scopus 로고
    • "http://www.f-secure.com/v-descs/flexispya.shtml, ".
  • 8
    • 57349142501 scopus 로고    scopus 로고
    • Proactive security for mobile messaging networks
    • A. Bose and K. Shin, "Proactive security for mobile messaging networks," in Proc. of WiSe, 2006.
    • (2006) Proc. of WiSe
    • Bose, A.1    Shin, K.2
  • 9
    • 77952369946 scopus 로고    scopus 로고
    • Smartsiren: Virus detection and alert for smartphones
    • J. Chen, S. Wongand, H. Yang, and S. Lu, "Smartsiren: Virus detection and alert for smartphones," in MobiSys, 2007.
    • (2007) MobiSys
    • Chen, J.1    Wongand, S.2    Yang, H.3    Lu, S.4
  • 10
    • 57349112465 scopus 로고    scopus 로고
    • Using labeling to prevent cross-service attacks against smartphones
    • C. Mulliner, G. Vigna, D. Dagon, and W. Lee, "Using labeling to prevent cross-service attacks against smartphones," in DIMVA, 2006.
    • (2006) DIMVA
    • Mulliner, C.1    Vigna, G.2    Dagon, D.3    Lee, W.4
  • 11
    • 39049086351 scopus 로고    scopus 로고
    • Vulnerability analysis of mms user agents
    • C. Mulliner and G. Vigna, "Vulnerability analysis of mms user agents," in Proc. of ACM ACSAC, 2006.
    • (2006) Proc. of ACM ACSAC
    • Mulliner, C.1    Vigna, G.2
  • 12
    • 84868071184 scopus 로고    scopus 로고
    • "http://en.wikipedia.org/wiki/stack-buffer-overflow, ".
  • 14
    • 33748062337 scopus 로고    scopus 로고
    • Prima: Policy-reduced integrity measurement architecture
    • T. Jaeger, R. Sailer, and U. Shankar, "Prima: Policy-reduced integrity measurement architecture," in Proc. of SACMAT, 2006.
    • (2006) Proc. of SACMAT
    • Jaeger, T.1    Sailer, R.2    Shankar, U.3
  • 15
    • 84868053965 scopus 로고    scopus 로고
    • "http://www.virtuallogix.com/, ".
  • 18
    • 33745796561 scopus 로고    scopus 로고
    • Exploiting open functionality in sms-capable celluar networks
    • W. Enck, P. Traynor, P. McDaniel, and T. La Porta, "Exploiting open functionality in sms-capable celluar networks," in ACM CCS, 2005.
    • (2005) ACM CCS
    • Enck, W.1    Traynor, P.2    McDaniel, P.3    Porta, T.L.4
  • 19
    • 84868053964 scopus 로고    scopus 로고
    • "http://www.3gpp.org/ftp/specs/archive, ".
  • 20
    • 84868053916 scopus 로고    scopus 로고
    • "http://www.cse.psu.edu/~lxie/techrep/, ".
  • 21
    • 84868053932 scopus 로고    scopus 로고
    • "http://trolltech.com/products/qtopia, ".
  • 22
    • 84868053934 scopus 로고    scopus 로고
    • "http://trolltech.com/products/qtopia/qtopiainuse/qtopiadevices, ".
  • 23
    • 84868054840 scopus 로고    scopus 로고
    • "http://www.pcmag.com/article2/0, 4149, 1306805, 00.asp, ".
  • 26
    • 84868084837 scopus 로고    scopus 로고
    • "http://www.captcha.net/captchas/gimpy, ".
  • 27
    • 84868071160 scopus 로고    scopus 로고
    • "http://www.cs.sfu.ca/~mori/research/gimpy, ".
  • 28
    • 84868054838 scopus 로고    scopus 로고
    • "http://www.elinux.org/osk, ".
  • 29
    • 84868071148 scopus 로고    scopus 로고
    • "http://www.cse.psu.edu/~lxie/snapshots/, ".
  • 32
    • 84868071147 scopus 로고    scopus 로고
    • "http://sourceforge.net/projects/lmbench/, ".
  • 33
    • 57349125651 scopus 로고    scopus 로고
    • Behavioral detection of malware on mobile handsets
    • A. Bose and et al., "Behavioral detection of malware on mobile handsets," in MobiSys, 2008.
    • (2008) MobiSys
    • Bose, A.1
  • 37
    • 67049128150 scopus 로고    scopus 로고
    • Exploiting mms vulnerabilities to stealthily exhause mobile phone's battery
    • R. Racic, D. Ma, and H. Chen, "Exploiting mms vulnerabilities to stealthily exhause mobile phone's battery," in IEEE SecureComm, 2006.
    • (2006) IEEE SecureComm
    • Racic, R.1    Ma, D.2    Chen, H.3
  • 38
    • 70349659420 scopus 로고    scopus 로고
    • A social network based patching scheme for worm containment in cellular networks
    • Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci., "A social network based patching scheme for worm containment in cellular networks," in Proceedings of IEEE Infocom, 2009.
    • (2009) Proceedings of IEEE Infocom
    • Zhu, Z.1    Cao, G.2    Zhu, S.3    Ranjan, S.4    Nucci, A.5
  • 39
    • 74949143206 scopus 로고    scopus 로고
    • On the effectiveness of internal patch dissemination against file-sharing worms
    • L. Xie, H. Song, and S. Zhu, "On the effectiveness of internal patch dissemination against file-sharing worms," in Proc. of ACNS, 2008.
    • (2008) Proc. of ACNS
    • Xie, L.1    Song, H.2    Zhu, S.3
  • 40
    • 74949106845 scopus 로고    scopus 로고
    • Message dropping attacks in overlay networks: Attack dectection and attacker identification
    • L. Xie and S. Zhu, "Message dropping attacks in overlay networks: Attack dectection and attacker identification," in Proc. of SecureComm, 2006.
    • (2006) Proc. of SecureComm
    • Xie, L.1    Zhu, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.