-
1
-
-
33744499088
-
Malicious code moves to mobile devices
-
N. Leavitt, "Malicious Code Moves to Mobile Devices," IEEE Computer, vol. 33, no. 12, 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.12
-
-
Leavitt, N.1
-
2
-
-
0042827876
-
Are handheld viruses a significant threat?
-
S. N. Foley and R. Dumigan, "Are Handheld Viruses a Significant Threat?" Commun. ACM, vol. 44, no. 1, 2001.
-
(2001)
Commun. ACM
, vol.44
, Issue.1
-
-
Foley, S.N.1
Dumigan, R.2
-
3
-
-
10944254818
-
Mobile phones as computing devices: The viruses are coming!
-
D. Dagon et al., "Mobile Phones as Computing Devices: The Viruses are Coming!" IEEE Pervasive Computing, vol. 3, no. 4, 2004.
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
-
-
Dagon, D.1
-
4
-
-
18144370814
-
Mobile phones: The next frontier for hackers?
-
N. Leavitt, "Mobile Phones: The Next Frontier for Hackers?" IEEE Computer, vol. 38, no. 4, 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.4
-
-
Leavitt, N.1
-
6
-
-
58449085422
-
The wireless epidemic
-
Sep.
-
J. Kleinberg, "The Wireless Epidemic," Nature, vol. 449, no. 20, Sep. 2007.
-
(2007)
Nature
, vol.449
, Issue.20
-
-
Kleinberg, J.1
-
7
-
-
44649187943
-
Is it finally time to worry about mobile malware?
-
G. Lawton, "Is It Finally Time to Worry about Mobile Malware?" IEEE Computer, vol. 41, no. 5, 2008.
-
(2008)
IEEE Computer
, vol.41
, Issue.5
-
-
Lawton, G.1
-
10
-
-
85177665325
-
Virusability of modern mobile environments
-
Sep.
-
V. Bontchev, "Virusability of Modern Mobile Environments," in Virus Bulletin Conference, Sep. 2007.
-
(2007)
Virus Bulletin Conference
-
-
Bontchev, V.1
-
12
-
-
80051984773
-
-
A. Portnoy, "Pwn2Own 2010," 2010, http://dvlabs.tippingpoint. com/blog/2010/02/15/pwn2own-2010.
-
(2010)
Pwn2Own 2010
-
-
Portnoy, A.1
-
22
-
-
85177645946
-
-
Bladox, s.r.o., "Turbo SIM," http://www.bladox.com/.
-
Turbo SIM
-
-
-
24
-
-
85177636943
-
-
OsmocomBB project, "SIMtrace," http://bb.osmocom.org/trac/wiki/ SIMtrace.
-
SIMtrace
-
-
-
26
-
-
85177698486
-
-
University of Glamorgan May
-
University of Glamorgan, "Disk Study 2008-2009," May 2009, http://isrg.weblog.glam.ac.uk/2009/5/7/disk-study-2008-2009.
-
(2009)
Disk Study 2008-2009
-
-
-
28
-
-
43449099742
-
Instant ciphertext-only cryptanalysis of GSM encrypted communication
-
E. Barkan et al., "Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication," J. Cryptology, vol. 21, no. 3, 2008.
-
(2008)
J. Cryptology
, vol.21
, Issue.3
-
-
Barkan, E.1
-
30
-
-
85177666140
-
-
OsmocomBB project, "OpenBSC," http://openbsc.osmocom.org/trac/.
-
OpenBSC
-
-
-
31
-
-
85177699613
-
-
OpenBTS, "GSM. Simplified." http://openbts.sf.net/.
-
GSM. Simplified
-
-
-
32
-
-
33845449638
-
A related-key rectangle attack on the full KASUMI
-
E. Biham et al., "A Related-Key Rectangle Attack on the Full KASUMI," in ASIACRYPT, 2005.
-
(2005)
ASIACRYPT
-
-
Biham, E.1
-
34
-
-
34247488845
-
Impact of paging channel overloads or attacks on a cellular network
-
J. Serror et al., "Impact of Paging Channel Overloads or Attacks on a Cellular Network," in ACM Workshop on Wireless Security (WiSe), 2006.
-
(2006)
ACM Workshop on Wireless Security (WiSe)
-
-
Serror, J.1
-
35
-
-
61449199429
-
Mitigating attacks on open functionality in SMS-capable cellular networks
-
P. Traynor et al., "Mitigating Attacks on Open Functionality in SMS-capable Cellular Networks," IEEE/ACM Trans. Netw., vol. 17, no. 1, 2009.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
-
-
Traynor, P.1
-
36
-
-
67049128150
-
Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery
-
R. Racic et al., "Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery," in Security and Privacy in Comm. Networks (SecureComm), 2006.
-
(2006)
Security and Privacy in Comm. Networks (SecureComm)
-
-
Racic, R.1
-
37
-
-
85177680134
-
3rd generation partnership project; technical specification group services and system aspects; 3G security; security principles and objectives (Release 4)
-
3GPP Mar.
-
3GPP, "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G security; Security principles and objectives (Release 4)," 3rd Generation Partnership Project (3GPP), Tech. Rep., Mar. 2001.
-
(2001)
3rd Generation Partnership Project (3GPP), Tech. Rep.
-
-
-
38
-
-
85177664918
-
Comprehensive analysis of UMTS authentication and key agreement
-
M. Hassan et al., "Comprehensive Analysis of UMTS Authentication and Key Agreement," International Journal of Computer and Network Security, vol. 2, no. 2, 2010.
-
(2010)
International Journal of Computer and Network Security
, vol.2
, Issue.2
-
-
Hassan, M.1
-
39
-
-
80051993427
-
Security mechanisms in UMTS
-
S. Pütz, R. Schmitz, and T. Martin, "Security Mechanisms in UMTS," Datenschutz und Datensicherheit, vol. 25, no. 6, 2001.
-
(2001)
Datenschutz und Datensicherheit
, vol.25
, Issue.6
-
-
Pütz, S.1
Schmitz, R.2
Martin, T.3
-
41
-
-
68449104742
-
On the detection of signaling DoS attacks on 3G/WiMax wireless networks
-
P. P. C. Lee et al., "On the Detection of Signaling DoS Attacks on 3G/WiMax Wireless Networks," Comput. Netw., vol. 53, no. 15, 2009.
-
(2009)
Comput. Netw.
, vol.53
, Issue.15
-
-
Lee, P.P.C.1
-
43
-
-
84939573910
-
Differential power analysis
-
M. J. Wiener, Ed. Springer
-
P. C. Kocher et al., "Differential Power Analysis," in CRYPTO, ser. Lecture Notes in Computer Science, M. J. Wiener, Ed., vol. 1666. Springer, 1999.
-
(1999)
CRYPTO, Ser. Lecture Notes in Computer Science
, vol.1666
-
-
Kocher, P.C.1
-
44
-
-
32444432722
-
Partitioning attacks: Or how to rapidly clone some GSM cards
-
J. R. Rao et al., "Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards," in IEEE Symposium on Security and Privacy, 2002.
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Rao, J.R.1
-
48
-
-
74049108559
-
On cellular botnets: Measuring the impact of malicious devices on a cellular network core
-
P. Traynor et al., "On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core," in ACM Conference on Computer and Communications Security (CCS), 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS)
-
-
Traynor, P.1
-
49
-
-
33750358907
-
Malicious actions against the GPRS technology
-
C. Xenakis, "Malicious Actions against the GPRS Technology." Journal in Computer Virology, vol. 2, no. 2, 2006.
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.2
-
-
Xenakis, C.1
-
51
-
-
85177638390
-
-
Symantec Security Response, "Androi-dOS. Tapsnake: Watching Your Every Move," 2010, http://www.symantec.com/connect/blogs/androidostapsnake- watching-your-every-move.
-
(2010)
Androi-dOS. Tapsnake: Watching Your Every Move
-
-
-
52
-
-
85177700576
-
-
N. Seriot, "SpyPhone," 2010, "https://github.com/nst/ spyphone/".
-
(2010)
SpyPhone
-
-
Seriot, N.1
-
55
-
-
70350423437
-
The underground economy: Priceless
-
Dec
-
R. Thomas and J. Martin, "The Underground Economy: Priceless," USENIX; login:, vol. 31, no. 6, Dec 2006.
-
(2006)
USENIX; login
, vol.31
, Issue.6
-
-
Thomas, R.1
Martin, J.2
-
56
-
-
78649809598
-
Learning more about the underground economy: A case-study of keyloggers and dropzones
-
T. Holz et al., "Learning More About the Underground Economy: a Case-Study of Keyloggers and Dropzones," in European Conference on Research in Computer Security (ESORICS), 2009.
-
(2009)
European Conference on Research in Computer Security (ESORICS)
-
-
Holz, T.1
-
60
-
-
79958851198
-
Design of SMS commanded-and-controlled and P2P-structured mobile botnets
-
Y. Zeng et al., "Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets," University of Michigan, Tech. Rep. CSE-TR-562-10, 2010.
-
(2010)
University of Michigan, Tech. Rep. CSE-TR-562-10
-
-
Zeng, Y.1
-
62
-
-
33746632334
-
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
-
F. C. Freiling et al., "Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks," in European Conference on Research in Computer Security (ESORICS), 2005.
-
(2005)
European Conference on Research in Computer Security (ESORICS)
-
-
Freiling, F.C.1
-
66
-
-
85177634086
-
-
OMTP Limited Oct.
-
OMTP Limited, "Browser," Oct. 2007.
-
(2007)
Browser
-
-
-
68
-
-
80052020585
-
PDA attacks, Part 2: Airborne viruses - Evolution of the latest threats
-
Oct.
-
C. Peikari, "PDA Attacks, Part 2: Airborne Viruses - Evolution of the Latest Threats," (IN)SECURE Magazine, vol. 4, Oct. 2005.
-
(2005)
(IN)Secure Magazine
, vol.4
-
-
Peikari, C.1
-
72
-
-
85177648459
-
SymbOS malware classification problems
-
Aug.
-
V. Bontchev, "SymbOS Malware Classification Problems," in Virus Bulletin Conference, Aug. 2006.
-
(2006)
Virus Bulletin Conference
-
-
Bontchev, V.1
-
73
-
-
85177694444
-
-
McAfee, "Mobile Security Report," 2008, http://www.mcafee.com/ us/localcontent/reports/mcafeemobilesecurityreport2008.pdf.
-
(2008)
Mobile Security Report
-
-
-
82
-
-
85177680821
-
This is not the droid you're looking for⋯
-
Aug.
-
N. J. Percoco and C. Papathanasiou, "This is not the Droid you're looking for⋯" in Defcon 18, Aug. 2010.
-
(2010)
Defcon 18
-
-
Percoco, N.J.1
Papathanasiou, C.2
-
85
-
-
78651527844
-
An analysis of the robustness and stability of the network stack in symbian-based smartphones
-
S. M. Habib et al., "An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones," Journal of Networks, vol. 4, no. 10, 2009.
-
(2009)
Journal of Networks
, vol.4
, Issue.10
-
-
Habib, S.M.1
-
92
-
-
85084161247
-
Why johnny can't encrypt: A usability evaluation of PGP 5.0
-
A. Whitten and J. D. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," in USENIX Security Symposium, 1999.
-
(1999)
USENIX Security Symposium
-
-
Whitten, A.1
Tygar, J.D.2
-
93
-
-
32444433117
-
The challenges of understanding and using security: A survey of end-users
-
S. Furnell et al., "The Challenges of Understanding and Using Security: A Survey of End-Users," Computers & Security, vol. 25, no. 1, 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.1
-
-
Furnell, S.1
-
95
-
-
33845531822
-
-
Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA, USA
-
S. L. Garfinkel, "Design Principles and Patterns for Computer Systems that are Simultaneously Secure and Usable," Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA, USA, 2005.
-
(2005)
Design Principles and Patterns for Computer Systems that Are Simultaneously Secure and Usable
-
-
Garfinkel, S.L.1
-
96
-
-
19944387279
-
Why users cannot use security
-
S. Furnell, "Why Users Cannot Use Security," Computers & Security, vol. 24, no. 4, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.4
-
-
Furnell, S.1
-
97
-
-
34547950128
-
Making security usable: Are things improving?
-
-, "Making Security Usable: Are Things Improving?" Computers & Security, vol. 26, no. 6, 2007.
-
(2007)
Computers & Security
, vol.26
, Issue.6
-
-
Furnell, S.1
-
98
-
-
27644560483
-
The state of security
-
P. Kuper, "The State of Security," IEEE Security & Privacy, vol. 3, no. 5, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.5
-
-
Kuper, P.1
|