메뉴 건너뛰기




Volumn 45, Issue 9, 2012, Pages 65-71

Detection of mobile malware in the wild

Author keywords

mobile malware detection; mobile security; smartphone protection

Indexed keywords

MOBILE MALWARE; MOBILE SECURITY; SECURITY THREATS;

EID: 84866674166     PISSN: 00189162     EISSN: None     Source Type: Trade Journal    
DOI: 10.1109/MC.2012.36     Document Type: Article
Times cited : (55)

References (15)
  • 2
    • 84858392040 scopus 로고    scopus 로고
    • A survey on automated dynamic malware analysis techniques and tools
    • M. Egele et al., "A Survey on Automated Dynamic Malware Analysis Techniques and Tools," ACM Computing Surveys, 2012; https://www.seclab. tuwien.ac.at/papers/malware-survey.pdf.
    • (2012) ACM Computing Surveys
    • Egele, M.1
  • 5
    • 85025700509 scopus 로고    scopus 로고
    • A study of android application security
    • W. Enck et al., "A Study of Android Application Security," Proc. 20th Usenix Security Symp., Usenix, 2011; http://static.usenix.org/events/ sec11/tech/full-papers/Enck.pdf.
    • (2011) Proc. 20th Usenix Security Symp.
    • Enck, W.1
  • 6
    • 79955570859 scopus 로고    scopus 로고
    • Taint droid: An information-flow tracking system for real-time privacy monitoring on smartphones
    • W. Enck, "TaintDroid: An Information-Flow Tracking System for Real-Time Privacy Monitoring on Smartphones," Proc. 9th Usenix Symp. Operating Systems Design and Implementation (OSDI 10), Usenix, 2010; http://static.usenix.org/events/osdi10/tech/full-papers/Enck.pdf.
    • (2010) Proc. 9th Usenix Symp. Operating Systems Design and Implementation (OSDI 10)
    • Enck, W.1
  • 9
    • 78649990344 scopus 로고    scopus 로고
    • A methodology for empirical analysis of permission-based security models and its application to android
    • D. Barrera et al., "A Methodology for Empirical Analysis of Permission-Based Security Models and Its Application to Android," Proc. 17th ACM Conf. Computer and Communications Security (CCS 10), ACM, 2010, pp. 73-84.
    • (2010) Proc. 17th ACM Conf. Computer and Communications Security (CCS 10), ACM , pp. 73-84
    • Barrera, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.