메뉴 건너뛰기




Volumn 376 AICT, Issue , 2012, Pages 13-24

Would you mind forking this process? A denial of service attack on android (and some countermeasures)

Author keywords

[No Author keywords available]

Indexed keywords

DENIAL OF SERVICE ATTACKS; EXPERIMENTAL EVIDENCE;

EID: 84863954784     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-30436-1_2     Document Type: Conference Paper
Times cited : (50)

References (15)
  • 1
    • 84863929670 scopus 로고    scopus 로고
    • Press Release November
    • Gartner Group. Press Release (November 2011), http://www.gartner.com/it/ page.jsp?id=1848514
    • (2011)
  • 8
    • 85037073388 scopus 로고    scopus 로고
    • Privilege Escalation Attacks on Android
    • Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. Springer, Heidelberg
    • Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege Escalation Attacks on Android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346-360. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6531 , pp. 346-360
    • Davi, L.1    Dmitrienko, A.2    Sadeghi, A.-R.3    Winandy, M.4
  • 10
    • 79251548972 scopus 로고    scopus 로고
    • Google android: A state-of-the-art review of security mechanisms
    • abs/0912.5101
    • Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S.: Google android: A state-of-the-art review of security mechanisms. CoRR, abs/0912.5101 (2009)
    • (2009) CoRR
    • Shabtai, A.1    Fledel, Y.2    Kanonov, U.3    Elovici, Y.4    Dolev, S.5
  • 11
    • 10944254818 scopus 로고    scopus 로고
    • Mobile phones as computing devices: The viruses are coming!
    • Dagon, D., Martin, T., Starner, T.: Mobile phones as computing devices: The viruses are coming! IEEE Pervasive Computing 3(4), 11-15 (2004)
    • (2004) IEEE Pervasive Computing , vol.3 , Issue.4 , pp. 11-15
    • Dagon, D.1    Martin, T.2    Starner, T.3
  • 12
    • 79952266600 scopus 로고    scopus 로고
    • Detection of Malicious Applications on Android OS
    • Sako, H., Franke, K., Saitoh, S. (eds.) IWCF 2010. Springer, Heidelberg
    • Di Cerbo, F., Girardello, A., Michahelles, F., Voronkova, S.: Detection of Malicious Applications on Android OS. In: Sako, H., Franke, K., Saitoh, S. (eds.) IWCF 2010. LNCS, vol. 6540, pp. 138-149. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6540 , pp. 138-149
    • Di Cerbo, F.1    Girardello, A.2    Michahelles, F.3    Voronkova, S.4
  • 15
    • 85037359376 scopus 로고    scopus 로고
    • Taming Information-Stealing Smart-phone Applications (on Android)
    • McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. Springer, Heidelberg
    • Zhou, Y., Zhang, X., Jiang, X., Freeh, V.W.: Taming Information-Stealing Smart-phone Applications (on Android). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 93-107. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6740 , pp. 93-107
    • Zhou, Y.1    Zhang, X.2    Jiang, X.3    Freeh, V.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.