메뉴 건너뛰기




Volumn , Issue , 2010, Pages 55-62

An android application sandbox system for suspicious software detection

Author keywords

[No Author keywords available]

Indexed keywords

ANDROID MARKETS; ANTI VIRUS; COMPUTATIONAL POWER; CONVENTIONAL TECHNIQUES; DETECTION ALGORITHM; DISTRIBUTED DETECTION; LINUX KERNEL; MALWARE ATTACKS; MOBILE SOFTWARES; NEW APPLICATIONS; OPERATING SYSTEMS; SMART-PHONES; SOFTWARE DETECTION; STATIC AND DYNAMIC ANALYSIS;

EID: 78651410113     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MALWARE.2010.5665792     Document Type: Conference Paper
Times cited : (388)

References (35)
  • 13
    • 38149125461 scopus 로고    scopus 로고
    • Low-level library analysis and summarization
    • D. Gopan and T. Reps. Low-level library analysis and summarization. In In CAV, pages 68-81, 2007.
    • (2007) In CAV , pp. 68-81
    • Gopan, D.1    Reps, T.2
  • 14
    • 44649187943 scopus 로고    scopus 로고
    • Is it finally time to worry about mobile malware?
    • G. Lawton. Is it finally time to worry about mobile malware? Computer, 41(5):12-14, 2008.
    • (2008) Computer , vol.41 , Issue.5 , pp. 12-14
    • Lawton, G.1
  • 18
    • 78651400469 scopus 로고    scopus 로고
    • Talk on 2005
    • C. Mulliner. Exploiting pocketpc, 2005. Talk on WhatTheHack 2005, http://wiki.whatthehack.org/images/c/c0/Collinmulliner-wth2005-exploiting- pocketpc.pdf.
    • (2005) Exploiting Pocketpc
    • Mulliner, C.1
  • 22
    • 38149083999 scopus 로고    scopus 로고
    • Exploiting execution context for the detection of anomalous system calls
    • D. Mutz, W. K. Robertson, G. Vigna, and R. A. Kemmerer. Exploiting execution context for the detection of anomalous system calls. In RAID, pages 1-20, 2007.
    • (2007) RAID , pp. 1-20
    • Mutz, D.1    Robertson, W.K.2    Vigna, G.3    Kemmerer, R.A.4
  • 26
    • 78651383136 scopus 로고    scopus 로고
    • Online; accessed 01-March-2010
    • A. Rubini. Kernel system calls. http://www.ar.linux.it/docs/ksys/ksys. html. [Online; accessed 01-March-2010].
    • Kernel System Calls
    • Rubini, A.1
  • 27
    • 77950125580 scopus 로고    scopus 로고
    • Technical Report TUB-DAI 02/08-01, Technische Universität Berlin, DAI-Labor, Feb.
    • A. Schmidt and S. Albayrak. Malicious software for smartphones. Technical Report TUB-DAI 02/08-01, Technische Universität Berlin, DAI-Labor, Feb. 2008. http://www.dai-labor.de.
    • (2008) Malicious Software for Smartphones
    • Schmidt, A.1    Albayrak, S.2
  • 28
    • 77950125580 scopus 로고    scopus 로고
    • Technical Report TUB-DAI 02/08-01, Technische Universität Berlin - DAI-Labor, Feb.
    • A.-D. Schmidt and S. Albayrak. Malicious software for smartphones. Technical Report TUB-DAI 02/08-01, Technische Universität Berlin - DAI-Labor, Feb. 2008.
    • (2008) Malicious Software for Smartphones
    • Schmidt, A.-D.1    Albayrak, S.2
  • 32
    • 78651409067 scopus 로고    scopus 로고
    • Securing android-powered mobile devices using selinux
    • PrePrints
    • A. Shabtai, Y. Fledel, and Y. Elovici. Securing android-powered mobile devices using selinux. IEEE Security and Privacy, 99(PrePrints), 2009.
    • (2009) IEEE Security and Privacy , vol.99
    • Shabtai, A.1    Fledel, Y.2    Elovici, Y.3
  • 34
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using cwsandbox
    • C. Willems, T. Holz, and F. Freiling. Toward automated dynamic malware analysis using cwsandbox. IEEE Security and Privacy, 5(2):32-39, 2007.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 32-39
    • Willems, C.1    Holz, T.2    Freiling, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.