메뉴 건너뛰기




Volumn 15, Issue 1, 2013, Pages 446-471

A survey on security for mobile devices

Author keywords

Intrusion Detection; Mobile Malware; Mobile Security; Trusted Mobile

Indexed keywords

MALWARE WRITERS; MOBILE MALWARE; MOBILE SECURITY; MOBILE SERVICE; PAPER SURVEYS; RESEARCH FIELDS; SECURITY SOLUTIONS; STATE OF THE ART; TRUSTED MOBILE; UBIQUITOUS SERVICE;

EID: 84873712223     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2012.013012.00028     Document Type: Article
Times cited : (418)

References (165)
  • 4
    • 73349129963 scopus 로고    scopus 로고
    • Insights into malware: Detection and prevention on mobile phones
    • D. ́Slzak, T.-h. Kim, W.-C. Fang, and K. P. Arnett, Eds. Springer Berlin Heidelberg, ch. 30
    • Q. Yan, Y. Li, T. Li, and R. Deng, "Insights into Malware: Detection and Prevention on Mobile Phones," in Security Technology, D. ́Slzak, T.-h. Kim, W.-C. Fang, and K. P. Arnett, Eds. Springer Berlin Heidelberg, 2009, vol. 58, ch. 30, pp. 242-249.
    • (2009) Security Technology , vol.58 , pp. 242-249
    • Yan, Q.1    Li, Y.2    Li, T.3    Deng, R.4
  • 7
    • 84873722513 scopus 로고    scopus 로고
    • This is not the droid you're looking for
    • July
    • C. Papathanasiou and N. J. Percoco, "This is not the droid you're looking for..." in DEFCON 18, July 2010.
    • (2010) DEFCON , vol.18
    • Papathanasiou, C.1    Percoco, N.J.2
  • 9
    • 79960864204 scopus 로고    scopus 로고
    • ISAM: An iPhone Stealth Airborne Malware
    • ser. IFIP Advances in Information and Communication Technology, J. Camenisch, S. Fischer- H?ubner, Y. Murayama, A. Portmann, and C. Rieder, Eds. Springer Boston, ch. 2
    • D. Damopoulos, G. Kambourakis, and S. Gritzalis, "iSAM: An iPhone Stealth Airborne Malware," in Future Challenges in Security and Privacy for Academia and Industry, ser. IFIP Advances in Information and Communication Technology, J. Camenisch, S. Fischer- H?ubner, Y. Murayama, A. Portmann, and C. Rieder, Eds. Springer Boston, 2011, vol. 354, ch. 2, pp. 17-28.
    • (2011) Future Challenges in Security and Privacy for Academia and Industry , vol.354 , pp. 17-28
    • Damopoulos, D.1    Kambourakis, G.2    Gritzalis, S.3
  • 11
    • 34249726252 scopus 로고    scopus 로고
    • Malware goes mobile
    • M. Hypponen, "Malware Goes Mobile," Scientific American, vol. 295, no. 5, pp. 46-53, 2006.
    • (2006) Scientific American , vol.295 , Issue.5 , pp. 46-53
    • Hypponen, M.1
  • 12
    • 44649187943 scopus 로고    scopus 로고
    • Is it finally time to worry about mobile malware?
    • May
    • G. Lawton, "Is It Finally Time to Worry about Mobile Malware?" Computer, vol. 41, pp. 12-14, May 2008.
    • (2008) Computer , vol.41 , pp. 12-14
    • Lawton, G.1
  • 14
    • 77950125580 scopus 로고    scopus 로고
    • Technische Universit?at Berlin - DAI-Labor, Tech. Rep. TUBDAI 02/08-01, February
    • A.-D. Schmidt and S. Albayrak, "Malicious Software for Smartphones," Technische Universit?at Berlin - DAI-Labor, Tech. Rep. TUBDAI 02/08-01, February 2008, http://www.dai-labor.de.
    • (2008) Malicious Software for Smartphones
    • Schmidt, A.-D.1    Albayrak, S.2
  • 16
    • 18144370814 scopus 로고    scopus 로고
    • Mobile phones: The next frontier for hackers?
    • N. Leavitt, "Mobile Phones: The Next Frontier for Hackers?" Computer, vol. 38, pp. 20-23, April 2005. (Pubitemid 40608419)
    • (2005) Computer , vol.38 , Issue.4 , pp. 20-23
    • Leavitt, N.1
  • 17
    • 84873731456 scopus 로고    scopus 로고
    • F-Secure, Aug, [Online].
    • F-Secure, "Liberty (Palm)," Aug 2000. [Online]. Available: http: //www.f-secure.com/v-descs/lib palm.shtml
    • (2000) Liberty (Palm)
  • 18
    • 84873730766 scopus 로고    scopus 로고
    • F-Secure, Jun, [Online].
    • "Bluetooth-Worm:SymbOS/Cabir," Jun 2004. [Online]. Available: http://www.f-secure.com/v-descs/ cabir.shtml
    • (2004) Bluetooth-Worm:SymbOS/Cabir
  • 19
    • 78651450487 scopus 로고    scopus 로고
    • [Online]
    • McAfee Labs, "Mobile Security Report 2009," 2009. [Online]. Available: http://www.mcafee. com/us/resources/reports/ rp-mobile-security-2009. pdf
    • (2009) Mobile Security Report 2009
  • 20
    • 33750436929 scopus 로고    scopus 로고
    • About malicious software in smartphones
    • DOI 10.1007/s11416-006-0022-0, Special Issue on Mobile Malware and Anti-malware technologies
    • S. T?oyssy and M. Helenius, "About malicious software in smartphones," Journal in Computer Virology, vol. 2, no. 2, pp. 109-119, 2006. (Pubitemid 44644384)
    • (2006) Journal in Computer Virology , vol.2 , Issue.2 , pp. 109-119
    • Toyssy, S.1    Helenius, M.2
  • 21
    • 36048940308 scopus 로고    scopus 로고
    • The economic impact of malicious code in wireless mobile networks
    • 3G 2003. 4th International Conference on (Conf. Publ. No 494) Jun 2003
    • S. Viveros, "The economic impact of malicious code in wireless mobile networks," in 3G Mobile Communication Technologies, 2003. 3G 2003. 4th International Conference on (Conf. Publ. No. 494), Jun 2003, pp. 1-6.
    • (2003) 3G Mobile Communication Technologies , pp. 1-6
    • Viveros, S.1
  • 23
    • 33744499088 scopus 로고    scopus 로고
    • Malicious code moves to mobile devices
    • December
    • N. Leavitt, "Malicious Code Moves to Mobile Devices," Computer, vol. 33, pp. 16-19, December 2000.
    • (2000) Computer , vol.33 , pp. 16-19
    • Leavitt, N.1
  • 24
    • 84861551458 scopus 로고    scopus 로고
    • [Online]
    • McAfee Labs, "2011 Threats Predictions," 2010. [Online]. Available: http://www.mcafee.com/ us/resources/reports/ rp-threat-predictions- 2011.pdf
    • (2010) 2011 Threats Predictions
  • 25
    • 79955408870 scopus 로고    scopus 로고
    • Semptember, [Online]
    • D. Barroso, "ZeuS Mitmo: Man-in-the-mobile," Semptember 2010. [Online]. Available: http:// securityblog.s21sec.com/2010/ 09/zeus-mitmo-man-in- mobile-i.html
    • (2010) ZeuS Mitmo: Man-in-the-mobile
    • Barroso, D.1
  • 26
    • 84860308663 scopus 로고    scopus 로고
    • Feb. [Online], Security Bulletin Malware Evolution 2010
    • A. Gostev, "Kaspersky Security Bulletin. Malware Evolution 2010," Feb 2011. [Online]. Available: http: //www.securelist.com/en/ analysis/204792161/Kas- persky Security Bulletin Malware Evolution 2010
    • (2011) Kaspersky Security Bulletin. Malware Evolution 2010
    • Gostev, A.1
  • 27
    • 84889069658 scopus 로고    scopus 로고
    • Jan, [Online]
    • Cisco, "Cisco 2010 Annual Security Report," Jan 2011. [Online]. Available: http://www.cisco.com/ en/US/prod/collateral/ vpndevc/security annual report 2010.pdf
    • (2011) Cisco 2010 Annual Security Report
  • 28
    • 79960864218 scopus 로고    scopus 로고
    • PandaLabs, [Online]
    • PandaLabs, "Annual Report," 2011. [Online]. Available: http://press.pandasecurity.com/wp-content/uploads/2010/ 05/ PandaLabs-Annual- Report-2010.pdf
    • (2011) Annual Report
  • 29
    • 84873713009 scopus 로고    scopus 로고
    • March 2011. [Online]. Available
    • Google Mobile Blog, "An Update on Android Market Security," March 2011. [Online]. Available: http://googlemobile.blogspot.com/ 2011/03/update-on-an- droid-market-security.html
    • An Update on Android Market Security
  • 30
    • 79951758149 scopus 로고    scopus 로고
    • [Online]
    • Sophos, "Security Threat Report," 2010. [Online]. Available: http://www.sophos.com/sophos/docs/eng/ papers/ sophos-security-threat-report- jan-2010-wpna.pdf
    • (2010) Security Threat Report
  • 31
    • 80755124492 scopus 로고    scopus 로고
    • Juniper Networks Global Threat Center, [Online]
    • Juniper Networks Global Threat Center, "Malicious Mobile Threats Report 2010/2011," 2011. [Online]. Available: http://www.juniper.net/ us/en/local/pdf/whitepapers/2000415-en.pdf
    • (2011) Malicious Mobile Threats Report 2010/2011
  • 37
    • 63049091681 scopus 로고    scopus 로고
    • From desktop to mobile: Examining the security experience
    • [Online]
    • R. A. Botha, S. M. Furnell, and N. L. Clarke, "From desktop to mobile: Examining the security experience," Computers & Security, vol. 28, no. 3-4, pp. 130-137, 2009. [Online]. Available: http://www.sciencedirect. com/science/article/B6V8G- 4TYJTT6-1/2/ 335760cc014d6e724fd8d188942025e6
    • (2009) Computers & Security , vol.28 , Issue.3-4 , pp. 130-137
    • Botha, R.A.1    Furnell, S.M.2    Clarke, N.L.3
  • 38
    • 51949119464 scopus 로고    scopus 로고
    • Master's thesis, University of California, Santa Barbara
    • C. R. Mulliner, "Security of Smart Phones," Master's thesis, University of California, Santa Barbara, 2006.
    • (2006) Security of Smart Phones
    • Mulliner, C.R.1
  • 42
    • 77951558980 scopus 로고    scopus 로고
    • When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments
    • ser. HotMobile '10. New York, NY, USA: ACM
    • J. Oberheide and F. Jahanian, "When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments," in Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, ser. HotMobile '10. New York, NY, USA: ACM, 2010, pp. 43-48.
    • (2010) Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications , pp. 43-48
    • Oberheide, J.1    Jahanian, F.2
  • 43
    • 78349253729 scopus 로고    scopus 로고
    • Towards dynamic malware analysis to increase mobile device security
    • M. Becher and F. C. Freiling, "Towards dynamic malware analysis to increase mobile device security," in Proc. of SICHERHEIT, 2008.
    • (2008) Proc. of SICHERHEIT
    • Becher, M.1    Freiling, F.C.2
  • 44
    • 84873719768 scopus 로고    scopus 로고
    • Intrusion and anomaly detection in wireless networks
    • Y. Zhan, J. Zheng, and M. Ma, Eds. Information Science Publishing
    • A. Makhlouf and N. Boudriga, "Intrusion and anomaly detection in wireless networks," in Handbook of Research on Wireless Security, Y. Zhan, J. Zheng, and M. Ma, Eds. Information Science Publishing, 2008.
    • (2008) Handbook of Research on Wireless Security
    • Makhlouf, A.1    Boudriga, N.2
  • 52
    • 33745796561 scopus 로고    scopus 로고
    • Exploiting open functionality in SMS-capable cellular networks
    • DOI 10.1145/1102120.1102171, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
    • W. Enck, P. Traynor, P. McDaniel, and T. La Porta, "Exploiting open functionality in SMS-capable cellular networks," in Proceedings of the 12th ACM conference on Computer and communications security, ser. CCS '05. New York, NY, USA: ACM, 2005, pp. 393-404. (Pubitemid 44022022)
    • (2005) Proceedings of the ACM Conference on Computer and Communications Security , pp. 393-404
    • Enck, W.1    Traynor, P.2    McDaniel, P.3    Porta, T.L.4
  • 54
    • 33750358907 scopus 로고    scopus 로고
    • Malicious actions against the GPRS technology
    • DOI 10.1007/s11416-006-0021-1, Special Issue on Mobile Malware and Anti-malware technologies
    • C. Xenakis, "Malicious actions against the GPRS technology," Journal in Computer Virology, vol. 2, no. 2, pp. 121-133, 2006. (Pubitemid 44632012)
    • (2006) Journal in Computer Virology , vol.2 , Issue.2 , pp. 121-133
    • Xenakis, C.1
  • 57
    • 34247390110 scopus 로고    scopus 로고
    • Proactive security for mobile messaging networks
    • DOI 10.1145/1161289.1161307, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
    • A. Bose and K. G. Shin, "Proactive security for mobile messaging networks," in WiSe '06: Proceedings of the 5th ACM workshop on Wireless security. New York, NY, USA: ACM, 2006, pp. 95-104. (Pubitemid 46634306)
    • (2006) WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security , vol.2006 , pp. 95-104
    • Bose, A.1    Shin, K.G.2
  • 59
    • 50049087364 scopus 로고    scopus 로고
    • On mobile viruses exploiting messaging and bluetooth services
    • Sept 2006
    • A. Bose and K. G. Shin, "On Mobile Viruses Exploiting Messaging and Bluetooth Services," in Securecomm and Workshops, 2006, Sept 2006, pp. 1-10.
    • (2006) Securecomm and Workshops , pp. 1-10
    • Bose, A.1    Shin, K.G.2
  • 60
  • 63
    • 33748991180 scopus 로고    scopus 로고
    • Modeling epidemic spreading in mobile environments
    • WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security
    • J. W. Mickens and B. D. Noble, "Modeling epidemic spreading in mobile environments," in WiSe '05: Proceedings of the 4th ACM workshop on Wireless security. New York, NY, USA: ACM, 2005, pp. 77-86. (Pubitemid 44447320)
    • (2005) WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security , pp. 77-86
    • Mickens, J.W.1    Noble, B.D.2
  • 64
    • 53949105871 scopus 로고    scopus 로고
    • The opportunistic transmission of wireless worms between mobile devices
    • [Online]
    • C. Rhodes and M. Nekovee, "The opportunistic transmission of wireless worms between mobile devices," Physica A: Statistical Mechanics and its Applications, vol. 387, no. 27, pp. 6837-6844, 2008. [Online]. Available: http://www.science- direct.com/science/ article/pii/S0378437108007772
    • (2008) Physica A: Statistical Mechanics and Its Applications , vol.387 , Issue.27 , pp. 6837-6844
    • Rhodes, C.1    Nekovee, M.2
  • 67
    • 39049104692 scopus 로고    scopus 로고
    • Bluetooth worms: Models, dynamics, and defense implications
    • DOI 10.1109/ACSAC.2006.18, 4041171, Proceedings - Annual Computer Security Applications Conference, ACSAC
    • G. Yan and S. Eidenbenz, "Bluetooth Worms: Models, Dynamics, and Defense Implications," in ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference. Washington, DC, USA: IEEE Computer Society, 2006, pp. 245-256. (Pubitemid 351232919)
    • (2006) Proceedings - Annual Computer Security Applications Conference, ACSAC , pp. 245-256
    • Yan, G.1    Eidenbenz, S.2
  • 70
    • 58849141571 scopus 로고    scopus 로고
    • Modeling propagation dynamics of bluetooth worms (extended version)
    • G. Yan and S. Eidenbenz, "Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)," IEEE Transactions on Mobile Computing, vol. 8, pp. 353-368, 2009.
    • (2009) IEEE Transactions on Mobile Computing , vol.8 , pp. 353-368
    • Yan, G.1    Eidenbenz, S.2
  • 79
    • 84873719036 scopus 로고    scopus 로고
    • Symbian worm yxes: Towards mobile botnets?
    • May
    • A. Apvrille, "Symbian Worm Yxes: Towards Mobile Botnets?" in The 19th EICAR Annual Conference, May 2010, pp. 31-54.
    • (2010) The 19th EICAR Annual Conference , pp. 31-54
    • Apvrille, A.1
  • 80
    • 84873741695 scopus 로고    scopus 로고
    • Feb, [Online]
    • M. Ballano, "Android Threats Getting Steamy," Feb 2011. [Online]. Available: http://www.symantec. com/connect/blogs/ android-threats-getting-steamy
    • (2011) Android Threats Getting Steamy
    • Ballano, M.1
  • 82
    • 85040679345 scopus 로고    scopus 로고
    • [Online]
    • Techie Buzz, "Android Data Theft Vulnerability Detailed," 2011. [Online]. Available: http://techie-buzz.com/mobile-news/ android-data-theft- vulnerability-detailed.html
    • (2011) Android Data Theft Vulnerability Detailed
  • 84
    • 78650596113 scopus 로고    scopus 로고
    • Black Hat DC, [Online]
    • N. Seriot, "iPhone Privacy," Black Hat DC, 2010. [Online]. Available: http://seriot.ch/resources/talks papers/iPhonePrivacy.pdf
    • (2010) IPhone Privacy
    • Seriot, N.1
  • 85
    • 67649764018 scopus 로고    scopus 로고
    • A personal mobile drm manager for smartphones
    • S. Bhatt, R. Sion, and B. Carbunar, "A personal mobile DRM manager for smartphones," Computers & Security, vol. 28, no. 6, pp. 327-340, 2009.
    • (2009) Computers & Security , vol.28 , Issue.6 , pp. 327-340
    • Bhatt, S.1    Sion, R.2    Carbunar, B.3
  • 90
    • 80051984773 scopus 로고    scopus 로고
    • [Online]
    • A. Portnoy, "Pwn2Own 2010," 2010. [Online]. Available: http: //dvlabs.tippingpoint.com/blog/2010/ 02/15/pwn2own-2010
    • (2010) Pwn2Own 2010
    • Portnoy, A.1
  • 99
    • 50049091842 scopus 로고    scopus 로고
    • Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery
    • aug.
    • R. Racic, D. Ma, and H. Chen, "Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery," in Securecomm and Workshops, 2006, aug. 2006, pp. 1-10.
    • (2006) Securecomm and Workshops, 2006 , pp. 1-10
    • Racic, R.1    Ma, D.2    Chen, H.3
  • 103
    • 84873742791 scopus 로고    scopus 로고
    • McAfee, [Online]
    • McAfee, "WaveSecure," 2011. [Online]. Available: https://www. wavesecure.com/
    • (2011) WaveSecure
  • 104
    • 84873714675 scopus 로고    scopus 로고
    • [Online]
    • Norton, "Norton Mobile Security Lite," 2011. [Online]. Available: http://us.norton.com/mobile-security/
    • (2011) Norton Mobile Security Lite
  • 105
    • 84873702188 scopus 로고    scopus 로고
    • IIT-CNR, [Online]
    • IIT-CNR, "iCareMobile," 2011. [Online]. Available: http: //icaremobile.iit.cnr.it/
    • (2011) ICareMobile
  • 106
    • 84873721466 scopus 로고    scopus 로고
    • [Online]
    • BullGuard Ltd, "BullGuard Mobile Security 10," 2011. [Online]. Available: http://www.bullguard.com
    • (2011) BullGuard Mobile Security 10
  • 107
    • 84873731834 scopus 로고    scopus 로고
    • Kaspersky Lab ZAO, [Online]
    • Kaspersky Lab ZAO, "Kaspersky Mobile Security 9," 2011. [Online]. Available: http://www.kaspersky.com/kaspersky mobile security
    • (2011) Kaspersky Mobile Security 9
  • 108
    • 84873731373 scopus 로고    scopus 로고
    • [Online]
    • ESET, "ESET Mobile Security," 2011. [Online]. Available: http: //www.eset.com/us/home/products/mobile-security/
    • (2011) ESET Mobile Security
  • 109
    • 84873707572 scopus 로고    scopus 로고
    • [Online]
    • Lookout, "Lookout Mobile Security," 2011. [Online]. Available: https://www.mylookout.com
    • (2011) Lookout Mobile Security
  • 110
    • 84885734839 scopus 로고    scopus 로고
    • Vulnerabilities and possible attacks against the gprs backbone network
    • ser. Lecture Notes in Computer Science, J. Lopez, Ed. Springer Berlin / Heidelberg
    • C. Xenakis and L. Merakos, "Vulnerabilities and Possible Attacks Against the GPRS Backbone Network," in Critical Information Infrastructures Security, ser. Lecture Notes in Computer Science, J. Lopez, Ed. Springer Berlin / Heidelberg, 2006, vol. 4347, pp. 262-272.
    • (2006) Critical Information Infrastructures Security , vol.4347 , pp. 262-272
    • Xenakis, C.1    Merakos, L.2
  • 111
    • 84873692516 scopus 로고    scopus 로고
    • Intrusion detection in cellular mobile networks
    • ser. Signals and Communication Technology, Y. Xiao, X. S. Shen, and D.-Z. Du, Eds. Springer US
    • B. Sun, Y. Xiao, and K. Wu, "Intrusion Detection in Cellular Mobile Networks," in Wireless Network Security, ser. Signals and Communication Technology, Y. Xiao, X. S. Shen, and D.-Z. Du, Eds. Springer US, 2007, pp. 183-210.
    • (2007) Wireless Network Security , pp. 183-210
    • Sun, B.1    Xiao, Y.2    Wu, K.3
  • 113
    • 77953137615 scopus 로고    scopus 로고
    • Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
    • A. Shabtai, U. Kanonov, and Y. Elovici, "Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method," J. Syst. Softw., vol. 83, no. 8, pp. 1524-1537, 2010.
    • (2010) J. Syst. Softw., Vol. , vol.83 , Issue.8 , pp. 1524-1537
    • Shabtai, A.1    Kanonov, U.2    Elovici, Y.3
  • 115
    • 84856225193 scopus 로고    scopus 로고
    • "Andromaly": A behavioral malware detection framework for android devices
    • 10.1007/s10844-010-0148-x. [Online]
    • A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, ""Andromaly": a behavioral malware detection framework for android devices," Journal of Intelligent Information Systems, pp. 1-30, 2011, 10.1007/s10844-010-0148-x. [Online]. Available: http://dx.doi.org/10.1007/ s10844-010-0148-x
    • (2011) Journal of Intelligent Information Systems , pp. 1-30
    • Shabtai, A.1    Kanonov, U.2    Elovici, Y.3    Glezer, C.4    Weiss, Y.5
  • 117
    • 36348943408 scopus 로고    scopus 로고
    • How mobile host batteries can improve network security
    • G. A. Jacoby, R. Marchany, and N. J. D. IV, "How Mobile Host Batteries Can Improve Network Security," IEEE Security and Privacy, vol. 4, pp. 40-49, 2006.
    • (2006) IEEE Security and Privacy , vol.4 , pp. 40-49
    • Jacoby, G.A.1    Marchany, R.2    Iv, N.J.D.3
  • 119
    • 84863290640 scopus 로고    scopus 로고
    • On the potential of limitationoriented malware detection and prevention techniques on mobile phones
    • Jan
    • Q. Yan, R. H. Deng, Y. Li, and T. Li, "On the Potential of Limitationoriented Malware Detection and Prevention Techniques on Mobile Phones," International Journal of Security and Its Applications (IJSIA), vol. 4(1), pp. 21-30, Jan 2010.
    • (2010) International Journal of Security and Its Applications (IJSIA) , vol.4 , Issue.1 , pp. 21-30
    • Yan, Q.1    Deng, R.H.2    Li, Y.3    Li, T.4
  • 137
    • 84873705577 scopus 로고    scopus 로고
    • Anomaly detection on mobile phone based operational behavior
    • T. Isohara, K. Takemori, and I. Sasase, "Anomaly Detection on Mobile Phone Based Operational Behavior," IPSJ Digital Courier, vol. 4, no. 0, pp. 9-17, 2008.
    • (2008) IPSJ Digital Courier , vol.4 , Issue.0 , pp. 9-17
    • Isohara, T.1    Takemori, K.2    Sasase, I.3
  • 138
    • 76649098286 scopus 로고    scopus 로고
    • Keystroke-based user identification on smart phones
    • ser. Lecture Notes in Computer Science, E. Kirda, S. Jha, and D. Balzarotti, Eds. Springer Berlin / Heidelberg
    • S. Zahid, M. Shahzad, S. Khayam, and M. Farooq, "Keystroke-Based User Identification on Smart Phones," in Recent Advances in Intrusion Detection, ser. Lecture Notes in Computer Science, E. Kirda, S. Jha, and D. Balzarotti, Eds. Springer Berlin / Heidelberg, 2009, vol. 5758, pp. 224-243.
    • (2009) Recent Advances in Intrusion Detection , vol.5758 , pp. 224-243
    • Zahid, S.1    Shahzad, M.2    Khayam, S.3    Farooq, M.4
  • 139
    • 26444504890 scopus 로고    scopus 로고
    • A mobile phone malicious software detection model with behavior checker
    • Web and Communication Technologies and Internet-Related Social Issues - HSI 2005: 3rd International Conference on Human.Society@Internet. Proceedings
    • T. S. Yap and H. T. Ewe, "A Mobile Phone Malicious Software Detection Model with Behavior Checker," in Web and Communication Technologies and Internet-Related Social Issues - HSI 2005, 3rd International Conference on Human.Society@Internet, Tokyo, Japan, July 27-29, 2005, Proceedings, ser. Lecture Notes in Computer Science, vol. 3597. Springer, 2005, pp. 57-65. (Pubitemid 41435937)
    • (2005) Lecture Notes in Computer Science , vol.3597 , pp. 57-65
    • Yap, T.S.1    Ewe, H.T.2
  • 140
  • 143
    • 78651527844 scopus 로고    scopus 로고
    • An analysis of the robustness and stability of the network stack in symbian-based smartphones
    • S. M. Habib, C. Jacob, and T. Olovsson, "An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones," Journal of Networks, vol. 4, no. 10, pp. 968-975, 2009.
    • (2009) Journal of Networks , vol.4 , Issue.10 , pp. 968-975
    • Habib, S.M.1    Jacob, C.2    Olovsson, T.3
  • 145
    • 57349090300 scopus 로고    scopus 로고
    • [Online]
    • J. de Haas, "Symbian phone Security," 2005. [Online]. Available: http://www.blackhat.com/ presentations/bh-europe-05/ BH EU 05-deHaas.pdf
    • (2005) Symbian Phone Security
    • De Haas, J.1
  • 151
    • 77950673302 scopus 로고    scopus 로고
    • Securing android-powered mobile devices using selinux
    • May
    • A. Shabtai, Y. Fledel, and Y. Elovici, "Securing Android-Powered Mobile Devices Using SELinux," IEEE Security and Privacy, vol. 8, pp. 36-44, May 2010.
    • (2010) IEEE Security and Privacy , vol.8 , pp. 36-44
    • Shabtai, A.1    Fledel, Y.2    Elovici, Y.3
  • 152
    • 85025700509 scopus 로고    scopus 로고
    • A study of android application security
    • ser. SEC'11. Berkeley, CA, USA: USENIX Association, [Online]
    • W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, "A study of Android application security," in Proceedings of the 20th USENIX conference on Security, ser. SEC'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 21-21. [Online]. Available: http://dl.acm.org/citation.cfm?id=2028067.2028088
    • (2011) Proceedings of the 20th USENIX Conference on Security , pp. 21-21
    • Enck, W.1    Octeau, D.2    McDaniel, P.3    Chaudhuri, S.4
  • 161
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a tcg-based integrity measurement architecture
    • ser. SSYM'04. Berkeley, CA, USA: USENIX Association
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a TCG-based integrity measurement architecture," in Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, ser. SSYM'04. Berkeley, CA, USA: USENIX Association, 2004, pp. 16-16.
    • (2004) Proceedings of the 13th Conference on USENIX Security Symposium , vol.13 , pp. 16-16
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doorn, L.4
  • 162
    • 33748062337 scopus 로고    scopus 로고
    • PRIMA: Policy-Reduced Integrity Measurement Architecture
    • SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
    • T. Jaeger, R. Sailer, and U. Shankar, "PRIMA: policy-reduced integrity measurement architecture," in SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies. New York, NY, USA: ACM, 2006, pp. 19-28. (Pubitemid 44300738)
    • (2006) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , vol.2006 , pp. 19-28
    • Jaeger, T.1    Sailer, R.2    Shankar, U.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.