-
1
-
-
84868075331
-
-
"http://www.us-cert.gov/pressroom/trendsandanalysisq108.pdf, ".
-
-
-
-
4
-
-
33749016105
-
-
Symantec Corporation
-
P. Ferrie, P. Szor, R. Stanev, and R. Mouritzen, "Security response: Symbos.cabir," Symantec Corporation, 2004.
-
(2004)
Security Response: Symbos.Cabir
-
-
Ferrie, P.1
Szor, P.2
Stanev, R.3
Mouritzen, R.4
-
6
-
-
84868071125
-
-
"http://www.idc.com/getdoc.jsp?containerid=206072, ".
-
-
-
-
7
-
-
84868054820
-
-
"http://www.f-secure.com/v-descs/flexispya.shtml, ".
-
-
-
-
8
-
-
57349142501
-
Proactive security for mobile messaging networks
-
A. Bose and K. Shin, "Proactive security for mobile messaging networks," in Proc. of WiSe, 2006.
-
(2006)
Proc. of WiSe
-
-
Bose, A.1
Shin, K.2
-
9
-
-
77952369946
-
Smartsiren: Virus detection and alert for smartphones
-
J. Chen, S. Wongand, H. Yang, and S. Lu, "Smartsiren: Virus detection and alert for smartphones," in MobiSys, 2007.
-
(2007)
MobiSys
-
-
Chen, J.1
Wongand, S.2
Yang, H.3
Lu, S.4
-
10
-
-
57349112465
-
Using labeling to prevent cross-service attacks against smartphones
-
C. Mulliner, G. Vigna, D. Dagon, and W. Lee, "Using labeling to prevent cross-service attacks against smartphones," in DIMVA, 2006.
-
(2006)
DIMVA
-
-
Mulliner, C.1
Vigna, G.2
Dagon, D.3
Lee, W.4
-
12
-
-
84868071184
-
-
"http://en.wikipedia.org/wiki/stack-buffer-overflow, ".
-
-
-
-
13
-
-
85084162270
-
Design and implementation of a tcg-based integrity measurement architecture
-
R. Sailer, X. Zhao, T. Jaeger, and L. Doom, "Design and implementation of a tcg-based integrity measurement architecture," in Proc. of Usenix Security Symposium, 2004.
-
(2004)
Proc. of Usenix Security Symposium
-
-
Sailer, R.1
Zhao, X.2
Jaeger, T.3
Doom, L.4
-
14
-
-
33748062337
-
Prima: Policy-reduced integrity measurement architecture
-
T. Jaeger, R. Sailer, and U. Shankar, "Prima: Policy-reduced integrity measurement architecture," in Proc. of SACMAT, 2006.
-
(2006)
Proc. of SACMAT
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
15
-
-
84868053965
-
-
"http://www.virtuallogix.com/, ".
-
-
-
-
18
-
-
33745796561
-
Exploiting open functionality in sms-capable celluar networks
-
W. Enck, P. Traynor, P. McDaniel, and T. La Porta, "Exploiting open functionality in sms-capable celluar networks," in ACM CCS, 2005.
-
(2005)
ACM CCS
-
-
Enck, W.1
Traynor, P.2
McDaniel, P.3
Porta, T.L.4
-
19
-
-
84868053964
-
-
"http://www.3gpp.org/ftp/specs/archive, ".
-
-
-
-
20
-
-
84868053916
-
-
"http://www.cse.psu.edu/~lxie/techrep/, ".
-
-
-
-
21
-
-
84868053932
-
-
"http://trolltech.com/products/qtopia, ".
-
-
-
-
22
-
-
84868053934
-
-
"http://trolltech.com/products/qtopia/qtopiainuse/qtopiadevices, ".
-
-
-
-
23
-
-
84868054840
-
-
"http://www.pcmag.com/article2/0, 4149, 1306805, 00.asp, ".
-
-
-
-
24
-
-
18744376590
-
Using graphic turing tests to counter automated ddos attack against web servers
-
W. Morein, A. Stavrou, D. Cook, A. Keromytis, V. Misra, and D. Rubenstein, "Using graphic turing tests to counter automated ddos attack against web servers," in ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Morein, W.1
Stavrou, A.2
Cook, D.3
Keromytis, A.4
Misra, V.5
Rubenstein, D.6
-
25
-
-
12244282921
-
CAPTCHA: Using hard AI problems for security
-
L. Ahn, M. Blum, N. Hopper, and J. Langford, "CAPTCHA: Using Hard AI Problems for Security," in EUROCRYPT, 2003.
-
(2003)
EUROCRYPT
-
-
Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
26
-
-
84868084837
-
-
"http://www.captcha.net/captchas/gimpy, ".
-
-
-
-
27
-
-
84868071160
-
-
"http://www.cs.sfu.ca/~mori/research/gimpy, ".
-
-
-
-
28
-
-
84868054838
-
-
"http://www.elinux.org/osk, ".
-
-
-
-
29
-
-
84868071148
-
-
"http://www.cse.psu.edu/~lxie/snapshots/, ".
-
-
-
-
32
-
-
84868071147
-
-
"http://sourceforge.net/projects/lmbench/, ".
-
-
-
-
33
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
A. Bose and et al., "Behavioral detection of malware on mobile handsets," in MobiSys, 2008.
-
(2008)
MobiSys
-
-
Bose, A.1
-
34
-
-
79959290358
-
Intelligent virus detection on mobile devices
-
Deepak Venugopal, Guoning Hu, and Nicoleta Roman, "Intelligent virus detection on mobile devices," in PST '06: Proceedings of the 2006 International Conference on Privacy, Security and Trust, 2006, pp. 1-4.
-
(2006)
PST '06: Proceedings of the 2006 International Conference on Privacy, Security and Trust
, pp. 1-4
-
-
Venugopal, D.1
Hu, G.2
Roman, N.3
-
35
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
H. Kim, J. Smith, and K. G. Shin, "Detecting energy-greedy anomalies and mobile malware variants," in Proc. of The International Conference on Mobile Systems, Applications, and Services, 2008.
-
(2008)
Proc. of the International Conference on Mobile Systems, Applications, and Services
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
36
-
-
74949124384
-
Towards a systematic approach for cell-phone worm containment
-
L. Xie, H. Song, T. Jaeger, and S. Zhu, "Towards a systematic approach for cell-phone worm containment," in in Proc. of WWW (poster paper), 2008.
-
(2008)
Proc. of WWW (Poster Paper)
-
-
Xie, L.1
Song, H.2
Jaeger, T.3
Zhu, S.4
-
37
-
-
67049128150
-
Exploiting mms vulnerabilities to stealthily exhause mobile phone's battery
-
R. Racic, D. Ma, and H. Chen, "Exploiting mms vulnerabilities to stealthily exhause mobile phone's battery," in IEEE SecureComm, 2006.
-
(2006)
IEEE SecureComm
-
-
Racic, R.1
Ma, D.2
Chen, H.3
-
38
-
-
70349659420
-
A social network based patching scheme for worm containment in cellular networks
-
Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci., "A social network based patching scheme for worm containment in cellular networks," in Proceedings of IEEE Infocom, 2009.
-
(2009)
Proceedings of IEEE Infocom
-
-
Zhu, Z.1
Cao, G.2
Zhu, S.3
Ranjan, S.4
Nucci, A.5
-
39
-
-
74949143206
-
On the effectiveness of internal patch dissemination against file-sharing worms
-
L. Xie, H. Song, and S. Zhu, "On the effectiveness of internal patch dissemination against file-sharing worms," in Proc. of ACNS, 2008.
-
(2008)
Proc. of ACNS
-
-
Xie, L.1
Song, H.2
Zhu, S.3
-
40
-
-
74949106845
-
Message dropping attacks in overlay networks: Attack dectection and attacker identification
-
L. Xie and S. Zhu, "Message dropping attacks in overlay networks: Attack dectection and attacker identification," in Proc. of SecureComm, 2006.
-
(2006)
Proc. of SecureComm
-
-
Xie, L.1
Zhu, S.2
|