메뉴 건너뛰기




Volumn , Issue , 2011, Pages 225-238

Security versus energy tradeoffs in host-based mobile malware detection

Author keywords

energy; mobile malware; rootkits; security

Indexed keywords

BATTERY POWER; DATA-DRIVEN; ENERGY; ENERGY TRADEOFF; HOST-BASED; MALWARES; MOBILE HANDHELD DEVICES; MOBILE MALWARE; PROTECTION MECHANISMS; RAPID GROWTH; ROOTKITS; SCANNING FREQUENCY; SECURITY; SWEET SPOT;

EID: 79961083689     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1999995.2000017     Document Type: Conference Paper
Times cited : (29)

References (47)
  • 1
    • 84872098996 scopus 로고    scopus 로고
    • OKl4 microvisor. http://www.ok-labs.com/products/okl4-microvisor.
    • OKl4 Microvisor
  • 4
    • 75249095299 scopus 로고    scopus 로고
    • April MacAfee AVERT Labs Whitepaper
    • Rootkits, Part 1 of 3: A Growing Threat. http://download.nai.com/ Products/mcafee-avert/whitepapers/akapoor-rootkits1.pdf, April 2006. MacAfee AVERT Labs Whitepaper.
    • (2006) Rootkits, Part 1 of 3: A Growing Threat
  • 5
    • 79960545596 scopus 로고    scopus 로고
    • December MacAfee AVERT Labs Whitepaper
    • 2010 threat predictions. http://www.mcafee.com/us/resources/reports/rp- threat-predictions-2010.pdf, December 2009. MacAfee AVERT Labs Whitepaper.
    • (2009) 2010 Threat Predictions
  • 7
    • 84856110053 scopus 로고    scopus 로고
    • ARM. Cortex-a9 processor. http://www.arm.com/products/processors/cortex- a/cortex-a9.php.
    • Cortex-a9 Processor
  • 31
    • 79961042145 scopus 로고    scopus 로고
    • LWN.net. lwn.net/Articles/75990
    • LWN.net. A New Adore Root Kit. lwn.net/Articles/75990/.
    • A New Adore Root Kit
  • 44
    • 77952351839 scopus 로고    scopus 로고
    • The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)
    • October
    • H. Shacham. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). In Proc. ACM Conference on Computer and Communications Security, pages 552-561, October 2007.
    • (2007) Proc. ACM Conference on Computer and Communications Security , pp. 552-561
    • Shacham, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.