-
1
-
-
80051520848
-
Mobile Attacks and Defense
-
July/Aug. doi:10.1109/MSP.2011.85
-
Charlie Miller, Mobile Attacks and Defense, IEEE Security and Privacy, vol. 9, no. 4, pp. 68-70, July/Aug. 2011, doi:10.1109/MSP.2011.85.
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.4
, pp. 68-70
-
-
Miller, C.1
-
2
-
-
84868111013
-
-
Visited 26.09.2011
-
Apple Inc. iphone. http://www.apple.com/iphone/, 2009. Visited 26.09.2011.
-
(2009)
Iphone
-
-
-
3
-
-
84856791639
-
-
Open Handset Alliance visited 26.09.2011
-
Open Handset Alliance. Android - an open handset alliance project. http://developer.android.com/, 2008. visited 26.09.2011.
-
(2008)
Android - An Open Handset Alliance Project
-
-
-
4
-
-
58349121306
-
-
Visited 26.09.2011
-
Microsoft Corporation. Windows mobile. http://www.microsoft.com/germany/ windowsmobile/default.mspx, 2007. Visited 26.09.2011.
-
(2007)
Windows Mobile
-
-
-
5
-
-
84868094107
-
-
Eingereicht von, Diplom-Informatiker Visited 26.09.2011
-
Eingereicht von, Diplom-Informatiker and Aubrey-Derrick Schmidt, Detection of Smartphone Malware, http://opus.kobv.de/tuberlin/volltexte/2011/ 3150/pdf/schmidtaubrey.pdf, 2011. Visited 26.09.2011.
-
(2011)
Detection of Smartphone Malware
-
-
Schmidt, A.-D.1
-
6
-
-
84908422161
-
Privacy revelations for web and mobile apps
-
D. Wetherall, D. Cho?nes, B. Greenstein, S. Han, P. Hornyack, J. Jung, S. Schechter, and X.Wang, Privacy revelations for web and mobile apps, In Proc. HotOS XIII, 2011.
-
Proc. HotOS XIII, 2011
-
-
Wetherall, D.1
Chones, D.2
Greenstein, B.3
Han, S.4
Hornyack, P.5
Jung, J.6
Schechter, S.7
Wang, X.8
-
7
-
-
84868110431
-
-
Visited26.09.201
-
B Solvr and Pedersen Stian Rene, Privacy services for mobile devices, http://ntnu.divaportal.org/smash/record.jsf;jsessionid= 9969f679ed72e0f61cd7b76e04bc?searchId=1&pid=diva2:443205, 2011. Visited26.09.201.
-
(2011)
Privacy Services for Mobile Devices
-
-
Solvr, B.1
Rene, P.S.2
-
8
-
-
60049085302
-
-
January
-
William Enck, Machigar Ongtang, and Patrick McDaniel, Understanding Android Security, IEEE Security & Privacy Magazine, 7(1):10-17, January, 2009.
-
(2009)
IEEE Security & Privacy Magazine
, vol.7
, Issue.1
, pp. 10-17
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
Security, U.A.4
-
9
-
-
85025700509
-
A Study of Android Application Security
-
William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri, A Study of Android Application Security, Proceedings of the 20th USENIX Security Symposium, August, 2011. San Francisco, CA.
-
Proceedings of the 20th USENIX Security Symposium, August, 2011. San Francisco, CA
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
10
-
-
85076889619
-
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
-
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), October, 2010. Vancouver, BC.
-
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), October, 2010. Vancouver, BC
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
11
-
-
80755181021
-
A Survey of Mobile Malware in the Wild
-
Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steven Hanna, and David Wagner, A Survey of Mobile Malware in the Wild, SPSM'11 Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, New York, NY, USA, 2011
-
SPSM'11 Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, New York, NY, USA, 2011
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
14
-
-
80755124506
-
-
Juniper Global Threat Center. Fake player. http://globalthreatcenter.com/ ?p=1907.
-
Fake Player
-
-
-
15
-
-
80755182904
-
-
Symantec. Android.geinimi. http://www.symantec.com/securityresponse/ writeup.jsp?docid=2011-010111-5403-99.
-
Android.geinimi
-
-
-
16
-
-
80755182901
-
Security Alert: HongTouTou, New Android Trojan, Found in China
-
T. Strazzere. Security Alert: HongTouTou, New Android Trojan, Found in China. The Lookout Blog, 2011.
-
(2011)
The Lookout Blog
-
-
Strazzere, T.1
-
17
-
-
84870681128
-
-
Android Market. http://www.android.com/market.
-
Android Market
-
-
-
19
-
-
84868153635
-
-
SVD, http://en.wikipedia.org/wiki/Singular-value-decomposition.
-
SVD
-
-
-
20
-
-
67349093319
-
Non-negative matrix factorization based on alternating non-negativity constrained least squares and active set method
-
H. Kim and H. Park, Non-negative matrix factorization based on alternating non-negativity constrained least squares and active set method, SIAM Journal on Matrix Analysis and Application, Vol. 30(2), pp. 713- 730, 2008.
-
(2008)
SIAM Journal on Matrix Analysis and Application
, vol.30
, Issue.2
, pp. 713-730
-
-
Kim, H.1
Park, H.2
-
21
-
-
84868153632
-
AutoSplit:FastandScalableDiscoveryof Hidden Variables in Stream and Multimedia Databases
-
J.-Y. Pan, H. Kitagawa, C.Faloutsos and M. Hamamoto,AutoSplit: FastandScalableDiscoveryof Hidden Variables in Stream and Multimedia Databases, PAKDD'04.
-
PAKDD'04
-
-
Pan, J.-Y.1
Kitagawa, H.2
Faloutsos, C.3
Hamamoto, M.4
-
22
-
-
0032629347
-
Fast and Robust Fixed-Point Algorithms for Independent Component Analysis
-
A. Hyvarinen, Fast and Robust Fixed-Point Algorithms for Independent Component Analysis, IEEE Transactions on Neural Networks, Vol. 10, pp. 626-634, 1999.
-
(1999)
IEEE Transactions on Neural Networks
, vol.10
, pp. 626-634
-
-
Hyvarinen, A.1
-
24
-
-
84868153634
-
-
Droidbox, http://code.google.com/p/droidbox/.
-
Droidbox
-
-
-
25
-
-
84868153636
-
-
Wireshark, http://www.wireshark.org/.
-
-
-
-
27
-
-
84928140517
-
Measuring and detecting fastflux service networks
-
T. Holz, C. Gorecki, K. Rieck, and F. Freiling, Measuring and detecting fastflux service networks, in Proceedings of the 15th Network and Distributed System Security Symposium (NDSS), 2008.
-
Proceedings of the 15th Network and Distributed System Security Symposium (NDSS), 2008
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.4
-
28
-
-
84868153637
-
-
[Online]. Available
-
Greenwich2000, Greenwich mean time (gmt), 2009, [Online]. Available: http://wwp.greenwichmeantime.com/.
-
(2009)
Greenwich Mean Time (Gmt)
-
-
-
29
-
-
77954487961
-
-
[Online]. Available
-
WorldTimeZone, "Standard time zones," 2009, [Online]. Available: http://www.worldtimezone.com/standard.html.
-
(2009)
Standard Time Zones
-
-
-
32
-
-
84868138439
-
Andromaly: A behavior malware detection framework for android devices
-
Springer
-
A. Shabtai U. Kanonov, Y. Elovici, C. Glezer and Y. Weiss, "Andromaly": a behavior malware detection framework for android devices, Journal of Intelligent System, Springer 2011.
-
(2011)
Journal of Intelligent System
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
|