-
1
-
-
48749129898
-
On the effort to create smartphone worms in windows mobile
-
20-22 June
-
M. Becher, F. Freiling, and B. Leider. On the effort to create smartphone worms in windows mobile. In Information Assurance and Security Workshop, 2007. IAW '07. IEEESMC, pages 199-206, 20-22 June 2007.
-
(2007)
Information Assurance and Security Workshop, 2007. IAW '07. IEEESMC
, pp. 199-206
-
-
Becher, M.1
Freiling, F.2
Leider, B.3
-
2
-
-
33751052185
-
Static detection of malicious code in executable programs
-
J. Bergeron, M. Debbabi, J. Desharnais, M. M. Erhioui, Y. Lavoie, and N. Tawbi. Static detection of malicious code in executable programs. In Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS'01), 2001.
-
Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS'01), 2001
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.M.4
Lavoie, Y.5
Tawbi, N.6
-
3
-
-
70849088841
-
-
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA
-
M. A. Bishop. The Art and Science of Computer Security. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2002.
-
(2002)
The Art and Science of Computer Security
-
-
Bishop, M.A.1
-
6
-
-
77954717029
-
Adsandbox: Sandboxing javascript to fight malicious websites
-
A. Dewald, T. Holz, and F. Freiling. Adsandbox: Sandboxing javascript to fight malicious websites. In Symposium on Applied Computing (SAC) 2010, Sierre, Switzerland, march 2010.
-
Symposium on Applied Computing (SAC) 2010, Sierre, Switzerland, March 2010
-
-
Dewald, A.1
Holz, T.2
Freiling, F.3
-
8
-
-
60049085302
-
Understanding android security
-
W. Enck, M. Ongtang, and P. McDaniel. Understanding android security. IEEE Security and Privacy, 7(1):50-57, 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
11
-
-
78651390294
-
-
Online; accessed 01-May-2010
-
D. K. Goldhammer, D. A. Wiegand, D. Becker, and M. Schmid. Goldmedia mobile life report 2012, mobile life in the 21st century, status quo and outlook. http://www.bitkom.org/60376.aspx?url=081009-bitkom-goldmedia-mobile- life-2012(1).pdf. [Online; accessed 01-May-2010].
-
Goldmedia Mobile Life Report 2012, Mobile Life in the 21st Century, Status Quo and Outlook
-
-
Goldhammer, D.K.1
Wiegand, D.A.2
Becker, D.3
Schmid, M.4
-
12
-
-
84887507059
-
Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit™ 1.2
-
Monterey, California, Dec.
-
L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit™ 1.2. In Proceedings of the USENIX Symposium on Internet Technologies and Systems, pages 102-112, Monterey, California, Dec. 1997.
-
(1997)
Proceedings of the USENIX Symposium on Internet Technologies and Systems
, pp. 102-112
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
13
-
-
38149125461
-
Low-level library analysis and summarization
-
D. Gopan and T. Reps. Low-level library analysis and summarization. In In CAV, pages 68-81, 2007.
-
(2007)
In CAV
, pp. 68-81
-
-
Gopan, D.1
Reps, T.2
-
14
-
-
44649187943
-
Is it finally time to worry about mobile malware?
-
G. Lawton. Is it finally time to worry about mobile malware? Computer, 41(5):12-14, 2008.
-
(2008)
Computer
, vol.41
, Issue.5
, pp. 12-14
-
-
Lawton, G.1
-
18
-
-
78651400469
-
-
Talk on 2005
-
C. Mulliner. Exploiting pocketpc, 2005. Talk on WhatTheHack 2005, http://wiki.whatthehack.org/images/c/c0/Collinmulliner-wth2005-exploiting- pocketpc.pdf.
-
(2005)
Exploiting Pocketpc
-
-
Mulliner, C.1
-
21
-
-
39049086351
-
Vulnerability analysis of mms user agents
-
Washington, DC, USA, IEEE Computer Society
-
C. Mulliner and G. Vigna. Vulnerability analysis of mms user agents. In ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference, pages 77-88, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference
, pp. 77-88
-
-
Mulliner, C.1
Vigna, G.2
-
22
-
-
38149083999
-
Exploiting execution context for the detection of anomalous system calls
-
D. Mutz, W. K. Robertson, G. Vigna, and R. A. Kemmerer. Exploiting execution context for the detection of anomalous system calls. In RAID, pages 1-20, 2007.
-
(2007)
RAID
, pp. 1-20
-
-
Mutz, D.1
Robertson, W.K.2
Vigna, G.3
Kemmerer, R.A.4
-
23
-
-
85077723796
-
Cloudav: N-version antivirus in the network cloud
-
J. Oberheide, E. Cooke, and F. Jahanian. Cloudav: N-version antivirus in the network cloud. In Proceedings of the 17th USENIX Security Symposium (Security'08), San Jose, CA, July 2008.
-
Proceedings of the 17th USENIX Security Symposium (Security'08), San Jose, CA, July 2008
-
-
Oberheide, J.1
Cooke, E.2
Jahanian, F.3
-
24
-
-
67049128150
-
Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery
-
R. Racic, D. Ma, and H. Chen. Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery. In Proceedings of the Second IEEE Communications Society / CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, MD, Aug. 2006.
-
Proceedings of the Second IEEE Communications Society / CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, MD, Aug. 2006
-
-
Racic, R.1
Ma, D.2
Chen, H.3
-
26
-
-
78651383136
-
-
Online; accessed 01-March-2010
-
A. Rubini. Kernel system calls. http://www.ar.linux.it/docs/ksys/ksys. html. [Online; accessed 01-March-2010].
-
Kernel System Calls
-
-
Rubini, A.1
-
27
-
-
77950125580
-
-
Technical Report TUB-DAI 02/08-01, Technische Universität Berlin, DAI-Labor, Feb.
-
A. Schmidt and S. Albayrak. Malicious software for smartphones. Technical Report TUB-DAI 02/08-01, Technische Universität Berlin, DAI-Labor, Feb. 2008. http://www.dai-labor.de.
-
(2008)
Malicious Software for Smartphones
-
-
Schmidt, A.1
Albayrak, S.2
-
28
-
-
77950125580
-
-
Technical Report TUB-DAI 02/08-01, Technische Universität Berlin - DAI-Labor, Feb.
-
A.-D. Schmidt and S. Albayrak. Malicious software for smartphones. Technical Report TUB-DAI 02/08-01, Technische Universität Berlin - DAI-Labor, Feb. 2008.
-
(2008)
Malicious Software for Smartphones
-
-
Schmidt, A.-D.1
Albayrak, S.2
-
29
-
-
70449482715
-
Static analysis of executables for collaborative malware detection on android
-
A.-D. Schmidt, R. Bye, H.-G. Schmidt, J. Clausen, O. Kiraz, K. Yüksel, A. Camtepe, and S. Albayrak. Static analysis of executables for collaborative malware detection on android. In IEEE International Congress on Communication (ICC) 2009 - Communication and Information Systems Security Symposium, 2009.
-
IEEE International Congress on Communication (ICC) 2009 - Communication and Information Systems Security Symposium, 2009
-
-
Schmidt, A.-D.1
Bye, R.2
Schmidt, H.-G.3
Clausen, J.4
Kiraz, O.5
Yüksel, K.6
Camtepe, A.7
Albayrak, S.8
-
30
-
-
77950125602
-
Detecting symbian os malware through static function call analysis
-
IEEE
-
A.-D. Schmidt, J. H. Clausen, S. A. Camtepe, and S. Albayrak. Detecting symbian os malware through static function call analysis. In Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), pages 15-22. IEEE, 2009.
-
(2009)
Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009)
, pp. 15-22
-
-
Schmidt, A.-D.1
Clausen, J.H.2
Camtepe, S.A.3
Albayrak, S.4
-
31
-
-
77950172440
-
Smartphone malware evolution revisited: Android next target?
-
IEEE
-
A.-D. Schmidt, H.-G. Schmidt, L. Batyuk, J. H. Clausen, S. A. Camtepe, S. Albayrak, and C. Yildizli. Smartphone malware evolution revisited: Android next target? In Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), pages 1-7. IEEE, 2009.
-
(2009)
Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009)
, pp. 1-7
-
-
Schmidt, A.-D.1
Schmidt, H.-G.2
Batyuk, L.3
Clausen, J.H.4
Camtepe, S.A.5
Albayrak, S.6
Yildizli, C.7
-
34
-
-
34047110218
-
Toward automated dynamic malware analysis using cwsandbox
-
C. Willems, T. Holz, and F. Freiling. Toward automated dynamic malware analysis using cwsandbox. IEEE Security and Privacy, 5(2):32-39, 2007.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
|