-
1
-
-
85170008388
-
-
Android. http://developer.android.com/.
-
-
-
-
3
-
-
85170017542
-
-
Dark side arises for phone apps. http://online.wsj.com/article/ SB10001424052748703340904575284532175834088.html?mod=WSJ-newsreel-technology.
-
Dark Side Arises for Phone Apps
-
-
-
4
-
-
78751518307
-
-
Hacking windows ce. http://www.phrack.org/issues.html?issue=63&id=6.
-
Hacking Windows ce
-
-
-
9
-
-
84890267460
-
-
Usb on-the-go. http://www.usb.org/developers/onthego/.
-
Usb On-the-go
-
-
-
10
-
-
77951566629
-
Rootkits on smart phones: Attacks, implications and opportunities
-
ACM
-
BICKFORD, J., O'HARE, R., BALIGA, A., GANAPATHY, V., AND IFTODE, L. Rootkits on smart phones: attacks, implications and opportunities. In HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (New York, NY, USA, 2010), ACM, pp. 49-54.
-
HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (New York, NY, USA, 2010)
, pp. 49-54
-
-
Bickford, J.1
O'Hare, R.2
Baliga, A.3
Ganapathy, V.4
Iftode, L.5
-
12
-
-
50249142448
-
Cloaker: Hardware supported rootkit concealment
-
IEEE Computer Society
-
DAVID, F. M., CHAN, E. M., CARLYLE, J. C., AND CAMPBELL, R. H. Cloaker: Hardware supported rootkit concealment. In SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2008), IEEE Computer Society, pp. 296-310.
-
SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2008)
, pp. 296-310
-
-
David, F.M.1
Chan, E.M.2
Carlyle, J.C.3
Campbell, R.H.4
-
13
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
ACM
-
ENCK, W., GILBERT, P., GON CHUN, B., JUNG, L. P. C. J., MCDANIEL, P., AND SHETH, A. N. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI '10: Proceedings of the 9th symposium on Operating systems design and implementation (New York, NY, USA, 2010), ACM, pp. 255-270.
-
OSDI '10: Proceedings of the 9th Symposium on Operating Systems Design and Implementation (New York, NY, USA, 2010)
, pp. 255-270
-
-
Enck, W.1
Gilbert, P.2
Gon Chun, B.3
Jung, L.P.C.J.4
Mcdaniel, P.5
Sheth, A.N.6
-
14
-
-
84870752871
-
Understanding android's security framework
-
ACM
-
ENCK, W., AND MCDANIEL, P. Understanding android's security framework. In CCS '08: Proceedings of the 15th ACM conference on Computer and communications security (New York, NY, USA, 2008), ACM, pp. 552-561.
-
CCS '08: Proceedings of the 15th ACM Conference on Computer and Communications Security (New York, NY, USA, 2008)
, pp. 552-561
-
-
Enck, W.1
Mcdaniel, P.2
-
15
-
-
33745796561
-
Exploiting open functionality in sms-capable cellular networks
-
ACM
-
ENCK, W., TRAYNOR, P., MCDANIEL, P., AND LA PORTA, T. Exploiting open functionality in sms-capable cellular networks. In CCS '05: Proceedings of the 12th ACM conference on Computer and communications security (New York, NY, USA, 2005), ACM, pp. 393-404.
-
CCS '05: Proceedings of the 12th ACM Conference on Computer and Communications Security (New York, NY, USA, 2005)
, pp. 393-404
-
-
Enck, W.1
Traynor, P.2
Mcdaniel, P.3
La Porta, T.4
-
16
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
ACM
-
KIM, H., SMITH, J., AND SHIN, K. G. Detecting energy-greedy anomalies and mobile malware variants. In MobiSys '08: Proceeding of the 6th international conference on Mobile systems, applications, and services (New York, NY, USA, 2008), ACM, pp. 239-252.
-
MobiSys '08: Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services (New York, NY, USA, 2008)
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
17
-
-
76649138917
-
Virusmeter: Preventing your cellphone from spies
-
Springer-Verlag
-
LIU, L., YAN, G., ZHANG, X., AND CHEN, S. Virusmeter: Preventing your cellphone from spies. In RAID '09: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (Berlin, Heidelberg, 2009), Springer-Verlag, pp. 244-264.
-
RAID '09: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (Berlin, Heidelberg, 2009)
, pp. 244-264
-
-
Liu, L.1
Yan, G.2
Zhang, X.3
Chen, S.4
-
18
-
-
77951748635
-
Effects of wi-fi and bluetooth battery exhaustion attacks on mobile devices
-
IEEE Computer Society
-
MOYERS, B. R., DUNNING, J. P., MARCHANY, R. C., AND TRONT, J. G. Effects of wi-fi and bluetooth battery exhaustion attacks on mobile devices. In HICSS '10: Proceedings of the 2010 43rd Hawaii International Conference on System Sciences (Washington, DC, USA, 2010), IEEE Computer Society, pp. 1-9.
-
HICSS '10: Proceedings of the 2010 43rd Hawaii International Conference on System Sciences (Washington, DC, USA, 2010)
, pp. 1-9
-
-
Moyers, B.R.1
Dunning, J.P.2
Marchany, R.C.3
Tront, J.G.4
-
19
-
-
57349085063
-
Measuring integrity on mobile phone systems
-
ACM
-
MUTHUKUMARAN, D., SAWANI, A., SCHIFFMAN, J., JUNG, B. M., AND JAEGER, T. Measuring integrity on mobile phone systems. In SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies (New York, NY, USA, 2008), ACM, pp. 155-164.
-
SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (New York, NY, USA, 2008)
, pp. 155-164
-
-
Muthukumaran, D.1
Sawani, A.2
Schiffman, J.3
Jung, B.M.4
Jaeger, T.5
-
20
-
-
33644854066
-
Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
-
IEEE Computer Society
-
NASH, D. C., MARTIN, T. L., HA, D. S., AND HSIAO, M. S. Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices. In PERCOMW '05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops (Washington, DC, USA, 2005), IEEE Computer Society, pp. 141-145.
-
PERCOMW '05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops (Washington, DC, USA, 2005)
, pp. 141-145
-
-
Nash, D.C.1
Martin, T.L.2
Ha, D.S.3
Hsiao, M.S.4
-
21
-
-
77950851532
-
Semantically rich application-centric security in android
-
ONGTANG, M., MCLAUGHLIN, S., ENCK, W., AND MCDANIEL, P. Semantically rich application-centric security in android. In In ACSAC '09: Annual Computer Security Applications Conference (2009).
-
ACSAC '09: Annual Computer Security Applications Conference (2009)
-
-
Ongtang, M.1
Mclaughlin, S.2
Enck, W.3
Mcdaniel, P.4
-
22
-
-
67049128150
-
Exploiting mms vulnerabilities to stealthily exhaust mobile phoneŠs battery
-
SECURECOMM
-
RADMILO RACIC, D. M., AND CHEN, H. Exploiting mms vulnerabilities to stealthily exhaust mobile phoneŠs battery. In In SecureComm 06 (2006), SECURECOMM, pp. 1-10.
-
(2006)
SecureComm 06
, pp. 1-10
-
-
Radmilo Racic, D.M.1
Chen, H.2
-
23
-
-
77955177819
-
-
CoRR abs/0912.5101
-
SHABTAI, A., FLEDEL, Y., KANONOV, U., ELOVICI, Y., AND DOLEV, S. Google android: A state-of-the-art review of security mechanisms. CoRR abs/0912.5101 (2009).
-
(2009)
Google Android: A State-of-the-art Review of Security Mechanisms
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
-
24
-
-
77950675112
-
Google android: A comprehensive security assessment
-
SHABTAI, A., FLEDEL, Y., KANONOV, U., ELOVICI, Y., DOLEV, S., AND GLEZER, C. Google android: A comprehensive security assessment. IEEE Security and Privacy 8 (2010), 35-44.
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
25
-
-
61449199429
-
Mitigating attacks on open functionality in sms-capable cellular networks
-
TRAYNOR, P., ENCK, W., MCDANIEL, P., AND PORTA, T. L. Mitigating attacks on open functionality in sms-capable cellular networks. IEEE/ACM Trans. Netw. 17, 1 (2009), 40-53.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 40-53
-
-
Traynor, P.1
Enck, W.2
Mcdaniel, P.3
Porta, T.L.4
-
26
-
-
70349263625
-
Stealthy video capturer: A new video-based spyware in 3g smartphones
-
ACM
-
XU, N., ZHANG, F., LUO, Y., JIA, W., XUAN, D., AND TENG, J. Stealthy video capturer: a new video-based spyware in 3g smartphones. In WiSec '09: Proceedings of the second ACM conference on Wireless network security (New York, NY, USA, 2009), ACM, pp. 69-78.
-
WiSec '09: Proceedings of the Second ACM Conference on Wireless Network Security (New York, NY, USA, 2009)
, pp. 69-78
-
-
Xu, N.1
Zhang, F.2
Luo, Y.3
Jia, W.4
Xuan, D.5
Teng, J.6
|