메뉴 건너뛰기




Volumn , Issue , 2010, Pages 37-48

PBMDS: A behavior-based malware detection system for cellphone devices

Author keywords

Behavior learning; Cellphone malware; System call

Indexed keywords

ANOMALOUS ACTIVITY; BATTERY POWER; BEHAVIOR LEARNING; BEHAVIOR-BASED; CELL PHONE; COMPUTING ENVIRONMENTS; CONSTRAINED DEVICES; DETECTION ACCURACY; FALSE POSITIVE RATES; HUMAN USERS; INPUT AND OUTPUTS; MALICIOUS TRAFFIC; MALWARE DETECTION; MALWARES; MOBILE NETWORKS; MOBILE PHONE APPLICATIONS; OPERATIONAL PATTERNS; PROBABILISTIC APPROACHES; PROCESS STATE; SERVICE CAPACITY; SMART PHONES; SYSTEM CALLS; USER BEHAVIORS; USER INPUT;

EID: 77952331717     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1741866.1741874     Document Type: Conference Paper
Times cited : (105)

References (41)
  • 1
    • 77952338561 scopus 로고    scopus 로고
    • http://en.wikipedia.org/wiki/cross-validation.
  • 2
    • 77952385692 scopus 로고    scopus 로고
    • http://trolltech.com/products/qtopia.
  • 3
    • 77952339871 scopus 로고    scopus 로고
    • http://www.elinux.org/osk.
  • 4
    • 77952347075 scopus 로고    scopus 로고
    • http://www.f-secure.com/v-descs/flexispy-a.shtml.
  • 5
    • 77952400527 scopus 로고    scopus 로고
    • http://www.uscert. gov/press-room/trendsandanalysisq108.pdf.
  • 6
    • 77952330109 scopus 로고    scopus 로고
    • http://www.virtuallogix.com/.
  • 7
    • 77952358614 scopus 로고    scopus 로고
    • mcafee.com/us/research/mobile-security-report-2008.html
    • Mcafee mobile security report 2008, mcafee.com/us/research/mobile- security-report-2008.html.
    • Mcafee Mobile Security Report 2008
  • 9
    • 77952381006 scopus 로고    scopus 로고
    • Mobile device ui design, http://blueflavor.com/blog/ 2006/apr/04/mobile- device-ui-design/.
    • Mobile Device Ui Design
  • 10
    • 77952405549 scopus 로고    scopus 로고
    • OpenMoko. http://wiki.openmoko.org.
  • 13
    • 70349721172 scopus 로고    scopus 로고
    • Behavioral detection of malware on mobile handsets
    • A. Bose and et al. Behavioral detection of malware on mobile handsets. In Proc. of MobiSys, 2008.
    • (2008) Proc. of MobiSys
    • Bose, A.1
  • 14
    • 57349142501 scopus 로고    scopus 로고
    • Proactive security for mobile messaging networks
    • A. Bose and K. Shin. Proactive security for mobile messaging networks. In Proc. of WiSe, 2006.
    • (2006) Proc. of WiSe
    • Bose, A.1    Shin, K.2
  • 15
    • 77952369946 scopus 로고    scopus 로고
    • Smartsiren: Virus detection and alert for smartphones
    • J. Chen, S. Wongand, H. Yang, and S. Lu. Smartsiren: Virus detection and alert for smartphones. In Proc. of MobiSys, 2007.
    • (2007) Proc. of MobiSys
    • Chen, J.1    Wongand, S.2    Yang, H.3    Lu, S.4
  • 25
    • 57649211221 scopus 로고    scopus 로고
    • One-handed touchscreen input for legacy applications
    • pages
    • A. K. Karlson and B. B. Bederson. One-handed touchscreen input for legacy applications. In Proc. of CHI, pages 1399-1408, 2008
    • (2008) Proc. of CHI , pp. 1399-1408
    • Karlson, A.K.1    Bederson, B.B.2
  • 27
    • 77952374488 scopus 로고    scopus 로고
    • Security information: Virus encyclopedia: Symbos-comwar.a: Technical details
    • M. Lactaotao. Security information: Virus encyclopedia: Symbos-comwar.a: Technical details. Trend Micro Inc., 2005.
    • (2005) Trend Micro Inc.
    • Lactaotao, M.1
  • 28
    • 0002774999 scopus 로고    scopus 로고
    • Learning patterns from unix process execution traces for intrustion detection
    • W. Lee, S. Stolfo, and P. Chan. Learning patterns from unix process execution traces for intrustion detection. In Proc. of AAAI, 1997.
    • (1997) Proc. of AAAI
    • Lee, W.1    Stolfo, S.2    Chan, P.3
  • 29
    • 39049086351 scopus 로고    scopus 로고
    • Vulnerability analysis of mms user agents
    • C. Mulliner and G. Vigna. Vulnerability analysis of mms user agents. In Proc. of ACM ACSAC, 2006.
    • (2006) Proc. of ACM ACSAC
    • Mulliner, C.1    Vigna, G.2
  • 30
    • 57349112465 scopus 로고    scopus 로고
    • Using labeling to prevent cross-service attacks against smartphones
    • C. Mulliner, G. Vigna, D. Dagon, and W. Lee. Using labeling to prevent cross-service attacks against smartphones. In DIMVA, 2006.
    • (2006) DIMVA
    • Mulliner, C.1    Vigna, G.2    Dagon, D.3    Lee, W.4
  • 32
    • 0024610919 scopus 로고
    • A tutorial on hidden markov models and selected applications in speech recognition
    • L. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. In Proc. of the IEEE, 1989.
    • (1989) Proc. of the IEEE
    • Rabiner, L.1
  • 33
    • 67049128150 scopus 로고    scopus 로고
    • Exploiting mms vulnerabilities to stealthily exhause mobile phone's battery
    • R. Racic, D. Ma, and H. Chen. Exploiting mms vulnerabilities to stealthily exhause mobile phone's battery. In IEEE SecureComm, 2006.
    • (2006) IEEE SecureComm
    • Racic, R.1    Ma, D.2    Chen, H.3
  • 36
    • 45349099441 scopus 로고    scopus 로고
    • The shannon lecture: Hidden markov models and the baum-welch algorithm
    • L. Welch. The shannon lecture: Hidden markov models and the baum-welch algorithm. In IEEE Information Theory Society Newsletter, 2003.
    • (2003) IEEE Information Theory Society Newsletter
    • Welch, L.1
  • 37
    • 0037636215 scopus 로고    scopus 로고
    • Intrusion detection using variable length audit trail patterns
    • A. Wespi, M. Dacier, and H. Debar. Intrusion detection using variable length audit trail patterns. In Proc. of RAID, 2000.
    • (2000) Proc. of RAID
    • Wespi, A.1    Dacier, M.2    Debar, H.3
  • 40
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrustion detection using dynamic and static behavioral models
    • D. Yeung and Y. Ding. Host-based intrustion detection using dynamic and static behavioral models. In Pattern Recognition, Issue.1, 2003.
    • (2003) Pattern Recognition , Issue.1
    • Yeung, D.1    Ding, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.