메뉴 건너뛰기




Volumn , Issue , 2009, Pages 11-21

Server-side detection of malware infection

Author keywords

Anti virus; Audit; Cell phone; Detection; Fraud; Incentive compatible; Infection; Malware; Mobile; Post mortem; Retroactive

Indexed keywords

ANTI VIRUS; BANDWIDTH LIMITATION; CELL PHONE; COMPUTING DEVICES; DEPLOYMENT ARCHITECTURE; INCENTIVE COMPATIBLE; MALWARES; MOBILE HANDSETS; POTENTIAL VALUES; SECURITY PROPERTIES; SERVICE PROVIDER;

EID: 77950903446     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1719030.1719033     Document Type: Conference Paper
Times cited : (15)

References (36)
  • 4
    • 77950878621 scopus 로고    scopus 로고
    • personal communication.
    • Michael Barrett, PayPal CSO, personal communication.
    • PayPal CSO
    • Barrett, M.1
  • 10
    • 36949010773 scopus 로고    scopus 로고
    • Tamper-Evident Digital Signatures: Protecting Certi cation Authorities Against Malware
    • J.Y. Choi, P. Golle, and M. Jakobsson, "Tamper-Evident Digital Signatures: Protecting Certi cation Authorities Against Malware," DACS, 2006.
    • (2006) DACS
    • Choi, J.Y.1    Golle, P.2    Jakobsson, M.3
  • 11
    • 77957695303 scopus 로고    scopus 로고
    • Organised crime groups in cyberspace: A typology
    • DOI 10.1007/s12117-008-9038-9
    • K.-K. R. Choo, "Organised crime groups in cyberspace: a typology," Trends in Organized Crime, DOI 10.1007/s12117-008-9038-9, 2008.
    • (2008) Trends in Organized Crime
    • Choo, K.-K.R.1
  • 14
    • 84860582730 scopus 로고    scopus 로고
    • Mitigating Drive-by Download Attacks: Challenges and Open Problems
    • M. Egele, E. Kirda, and C. Kruegel. Mitigating Drive-by Download Attacks: Challenges and Open Problems. In iNetSec, 2009.
    • (2009) INetSec
    • Egele, M.1    Kirda, E.2    Kruegel, C.3
  • 15
    • 76549120876 scopus 로고    scopus 로고
    • October
    • Georgia Tech Information Security Center, "Emerging Cyber Threats Report for 2009," October, 2008. www.gtisc.gatech.edu/pdf/ CyberThreatsReport2009.pdf.
    • (2008) Emerging Cyber Threats Report for 2009
  • 17
    • 77950904600 scopus 로고    scopus 로고
    • Abstract available at. Harris Interactive Public Relations Research, June
    • Harris Interactive Public Relations Research, "A Study about Mobile Device Users," June 2009. Abstract available at www.cloudmark.com/en/ company/mobile-survey.html, full version at www.cloudmark.com/releases/docs/ harris-poll- stats.pdf.
    • (2009) A Study about Mobile Device Users
  • 18
    • 66249120727 scopus 로고    scopus 로고
    • Phone Infections
    • 22 May
    • S. Havlin, "Phone Infections," Science, Vol.324. no.5930, pp. 1023-1024, 22 May 2009.
    • (2009) Science , vol.324 , Issue.5930 , pp. 1023-1024
    • Havlin, S.1
  • 21
    • 77950899687 scopus 로고    scopus 로고
    • blogs.parc.com/ blog/2009/09/a-central-nervous-system-for-automatically- detecting-malware/, September 9
    • M. Jakobsson, "A Central Nervous System for Automatically Detecting Malware," blogs.parc.com/ blog/2009/09/a-central-nervous-system-for- automatically-detecting-malware/, September 9, 2009
    • (2009) A Central Nervous System for Automatically Detecting Malware
    • Jakobsson, M.1
  • 22
    • 77950904599 scopus 로고    scopus 로고
    • blogs.parc.com/blog/2009/10/ will-mobile-payments-usher-in-a-new-era-of- crime/, October 13
    • M. Jakobsson, "Will mobile payments usher in a new era of crime?," blogs.parc.com/blog/2009/10/ will-mobile-payments-usher-in-a-new- era-of-crime/, October 13, 2009
    • (2009) Will Mobile Payments Usher in a New Era of Crime?
    • Jakobsson, M.1
  • 24
    • 84925063335 scopus 로고    scopus 로고
    • Javelin Strategy and Research, February
    • Javelin Strategy and Research, "2008 Identity Fraud Survey Report", February 2008. www.javelinstrategy.com/products/F59339/97/ delivery.pdf.
    • (2008) 2008 Identity Fraud Survey Report
  • 31
    • 85021950441 scopus 로고    scopus 로고
    • Cryptographic support for secure logs on untrusted machines
    • B. Schneier and J. Kelsey, "Cryptographic support for secure logs on untrusted machines," ACM TISSEC, 2(2):159Ñ176, 1999.
    • (1999) ACM TISSEC , vol.2 , Issue.2 , pp. 159-176
    • Schneier, B.1    Kelsey, J.2
  • 32
    • 41949111662 scopus 로고    scopus 로고
    • Using Cartoons to Teach Internet Security
    • S. Srikwan and M. Jakobsson, "Using Cartoons to Teach Internet Security," Cryptologia, vol.32, no.2, 2008.
    • (2008) Cryptologia , vol.32 , Issue.2
    • Srikwan, S.1    Jakobsson, M.2
  • 33
    • 68149130387 scopus 로고    scopus 로고
    • Published November eval.symantec.com/mktginfo/enterprise/white- papers/b-whitepaper-underground-economy- report-11-2008-14525717.en-us.pdf
    • Symantec Report on the Underground Economy, Published November 2008, eval.symantec.com/mktginfo/enterprise/white- papers/b-whitepaper-underground- economy- report-11-2008-14525717.en-us.pdf.
    • (2008) Symantec Report on the Underground Economy
  • 34
    • 54749125032 scopus 로고    scopus 로고
    • Trusted Computing Group. Version 1.2, Revision 103, July
    • Trusted Computing Group. Trusted platform module main specication. Version 1.2, Revision 103, July 2007.
    • (2007) Trusted Platform Module Main Specication
  • 35
    • 66349131932 scopus 로고    scopus 로고
    • Understanding the Spreading Patterns of Mobile Phone Viruses
    • 2 April
    • P. Wang, M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, "Understanding the Spreading Patterns of Mobile Phone Viruses," Science, 2 April 2009.
    • (2009) Science
    • Wang, P.1    Gonzalez, M.C.2    Hidalgo, C.A.3    Barabasi, A.-L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.