-
1
-
-
84872103625
-
Meteor: Seeding a security-enhancing infrastructure for multi-market application ecosystems
-
D. Barrera, W. Enck, and P. C. van Oorschot. Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems. In IEEE Mobile Security Technologies, 2012.
-
(2012)
IEEE Mobile Security Technologies
-
-
Barrera, D.1
Enck, W.2
Van Oorschot, P.C.3
-
2
-
-
35448979944
-
SmartSiren: Virus detection and alert for smartphones
-
DOI 10.1145/1247660.1247690, MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
-
J. Cheng, S. H. Wong, H. Yang, and S. Lu. Smartsiren: virus detection and alert for smartphones. In 5th International Conference on Mobile Systems, Applications and Services, pages 258-271, 2007. (Pubitemid 47620930)
-
(2007)
MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
, pp. 258-271
-
-
Cheng, J.1
Wong, S.H.Y.2
Yang, H.3
Lu, S.4
-
3
-
-
79961035117
-
Analyzing inter-application communication in Android
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in Android. In 9th International Conference on Mobile Systems, Applications, and Services, pages 239-252, 2011.
-
(2011)
9th International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
6
-
-
77954993714
-
MAUI: Making smartphones last longer with code offload
-
E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl. MAUI: making smartphones last longer with code offload. In 8th International Conference on Mobile Systems, Applications, and Services, pages 49-62, 2010.
-
(2010)
8th International Conference on Mobile Systems, Applications, and Services
, pp. 49-62
-
-
Cuervo, E.1
Balasubramanian, A.2
Cho, D.-K.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
Bahl, P.7
-
9
-
-
80755181021
-
A survey of mobile malware in the wild
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A survey of mobile malware in the wild. In 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pages 3-14, 2011.
-
(2011)
1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
10
-
-
84961733050
-
An experimental performance comparison of 3G and Wi-Fi
-
volume 6032 of LNCS
-
R. Gass and C. Diot. An experimental performance comparison of 3G and Wi-Fi. In Passive and Active Measurement, volume 6032 of LNCS, pages 71-80, 2010.
-
(2010)
Passive and Active Measurement
, pp. 71-80
-
-
Gass, R.1
Diot, C.2
-
12
-
-
85091899871
-
Retroactive detection of malware with applications to mobile platforms
-
M. Jakobsson and K.-A. Johansson. Retroactive detection of malware with applications to mobile platforms. In USENIX HotSec, 2010.
-
(2010)
USENIX HotSec
-
-
Jakobsson, M.1
Johansson, K.-A.2
-
15
-
-
76649138917
-
VirusMeter: Preventing your cellphone from spies
-
volume 5758 of LNCS
-
L. Liu, G. Yan, X. Zhang, and S. Chen. VirusMeter: Preventing your cellphone from spies. In Recent Advances in Intrusion Detection, volume 5758 of LNCS, pages 244-264, 2009.
-
(2009)
Recent Advances in Intrusion Detection
, pp. 244-264
-
-
Liu, L.1
Yan, G.2
Zhang, X.3
Chen, S.4
-
16
-
-
84865574920
-
-
Feb.
-
H. Lockheimer. Android and security. http://googlemobile.blogspot.com/ 2012/02/android-and-security.html, Feb. 2012.
-
(2012)
Android and Security
-
-
Lockheimer, H.1
-
17
-
-
71549142277
-
A framework for behavior-based malware analysis in the cloud
-
volume 5905 of LNCS
-
L. Martignoni, R. Paleari, and D. Bruschi. A framework for behavior-based malware analysis in the cloud. In Information Systems Security, volume 5905 of LNCS, pages 178-192, 2009.
-
(2009)
Information Systems Security
, pp. 178-192
-
-
Martignoni, L.1
Paleari, R.2
Bruschi, D.3
-
19
-
-
84924626503
-
Rethinking antivirus: Executable analysis in the network cloud
-
J. Oberheide, E. Cooke, and F. Jahanian. Rethinking antivirus: executable analysis in the network cloud. In USENIX HotSec, 2007.
-
(2007)
USENIX HotSec
-
-
Oberheide, J.1
Cooke, E.2
Jahanian, F.3
-
21
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian. Virtualized in-cloud security services for mobile devices. In 1st Workshop on Virtualization in Mobile Computing, pages 31-35, 2008.
-
(2008)
1st Workshop on Virtualization in Mobile Computing
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
22
-
-
78751498804
-
Paranoid Android: Versatile protection for smartphones
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid Android: versatile protection for smartphones. In 26th Annual Computer Security Applications Conference, pages 347-356, 2010.
-
(2010)
26th Annual Computer Security Applications Conference
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
|