-
4
-
-
73349129963
-
Insights into malware: Detection and prevention on mobile phones
-
D. ́Slzak, T.-h. Kim, W.-C. Fang, and K. P. Arnett, Eds. Springer Berlin Heidelberg, ch. 30
-
Q. Yan, Y. Li, T. Li, and R. Deng, "Insights into Malware: Detection and Prevention on Mobile Phones," in Security Technology, D. ́Slzak, T.-h. Kim, W.-C. Fang, and K. P. Arnett, Eds. Springer Berlin Heidelberg, 2009, vol. 58, ch. 30, pp. 242-249.
-
(2009)
Security Technology
, vol.58
, pp. 242-249
-
-
Yan, Q.1
Li, Y.2
Li, T.3
Deng, R.4
-
7
-
-
84873722513
-
This is not the droid you're looking for
-
July
-
C. Papathanasiou and N. J. Percoco, "This is not the droid you're looking for..." in DEFCON 18, July 2010.
-
(2010)
DEFCON
, vol.18
-
-
Papathanasiou, C.1
Percoco, N.J.2
-
8
-
-
77951566629
-
Rootkits on smart phones: Attacks, implications and opportunities
-
ser. HotMobile '10. New York, NY, USA: ACM
-
J. Bickford, R. O'Hare, A. Baliga, V. Ganapathy, and L. Iftode, "Rootkits on smart phones: attacks, implications and opportunities," in Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, ser. HotMobile '10. New York, NY, USA: ACM, 2010, pp. 49-54.
-
(2010)
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
, pp. 49-54
-
-
Bickford, J.1
O'Hare, R.2
Baliga, A.3
Ganapathy, V.4
Iftode, L.5
-
9
-
-
79960864204
-
ISAM: An iPhone Stealth Airborne Malware
-
ser. IFIP Advances in Information and Communication Technology, J. Camenisch, S. Fischer- H?ubner, Y. Murayama, A. Portmann, and C. Rieder, Eds. Springer Boston, ch. 2
-
D. Damopoulos, G. Kambourakis, and S. Gritzalis, "iSAM: An iPhone Stealth Airborne Malware," in Future Challenges in Security and Privacy for Academia and Industry, ser. IFIP Advances in Information and Communication Technology, J. Camenisch, S. Fischer- H?ubner, Y. Murayama, A. Portmann, and C. Rieder, Eds. Springer Boston, 2011, vol. 354, ch. 2, pp. 17-28.
-
(2011)
Future Challenges in Security and Privacy for Academia and Industry
, vol.354
, pp. 17-28
-
-
Damopoulos, D.1
Kambourakis, G.2
Gritzalis, S.3
-
11
-
-
34249726252
-
Malware goes mobile
-
M. Hypponen, "Malware Goes Mobile," Scientific American, vol. 295, no. 5, pp. 46-53, 2006.
-
(2006)
Scientific American
, vol.295
, Issue.5
, pp. 46-53
-
-
Hypponen, M.1
-
12
-
-
44649187943
-
Is it finally time to worry about mobile malware?
-
May
-
G. Lawton, "Is It Finally Time to Worry about Mobile Malware?" Computer, vol. 41, pp. 12-14, May 2008.
-
(2008)
Computer
, vol.41
, pp. 12-14
-
-
Lawton, G.1
-
14
-
-
77950125580
-
-
Technische Universit?at Berlin - DAI-Labor, Tech. Rep. TUBDAI 02/08-01, February
-
A.-D. Schmidt and S. Albayrak, "Malicious Software for Smartphones," Technische Universit?at Berlin - DAI-Labor, Tech. Rep. TUBDAI 02/08-01, February 2008, http://www.dai-labor.de.
-
(2008)
Malicious Software for Smartphones
-
-
Schmidt, A.-D.1
Albayrak, S.2
-
15
-
-
84873734880
-
-
[Online]
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "Survey of Mobile Malware in the Wild," 2011. [Online]. Available: http://www.eecs.berkeley.edu/~afelt/malware.html
-
(2011)
Survey of mobile malware in the wild
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
16
-
-
18144370814
-
Mobile phones: The next frontier for hackers?
-
N. Leavitt, "Mobile Phones: The Next Frontier for Hackers?" Computer, vol. 38, pp. 20-23, April 2005. (Pubitemid 40608419)
-
(2005)
Computer
, vol.38
, Issue.4
, pp. 20-23
-
-
Leavitt, N.1
-
17
-
-
84873731456
-
-
F-Secure, Aug, [Online].
-
F-Secure, "Liberty (Palm)," Aug 2000. [Online]. Available: http: //www.f-secure.com/v-descs/lib palm.shtml
-
(2000)
Liberty (Palm)
-
-
-
18
-
-
84873730766
-
-
F-Secure, Jun, [Online].
-
"Bluetooth-Worm:SymbOS/Cabir," Jun 2004. [Online]. Available: http://www.f-secure.com/v-descs/ cabir.shtml
-
(2004)
Bluetooth-Worm:SymbOS/Cabir
-
-
-
19
-
-
78651450487
-
-
[Online]
-
McAfee Labs, "Mobile Security Report 2009," 2009. [Online]. Available: http://www.mcafee. com/us/resources/reports/ rp-mobile-security-2009. pdf
-
(2009)
Mobile Security Report 2009
-
-
-
20
-
-
33750436929
-
About malicious software in smartphones
-
DOI 10.1007/s11416-006-0022-0, Special Issue on Mobile Malware and Anti-malware technologies
-
S. T?oyssy and M. Helenius, "About malicious software in smartphones," Journal in Computer Virology, vol. 2, no. 2, pp. 109-119, 2006. (Pubitemid 44644384)
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.2
, pp. 109-119
-
-
Toyssy, S.1
Helenius, M.2
-
21
-
-
36048940308
-
The economic impact of malicious code in wireless mobile networks
-
3G 2003. 4th International Conference on (Conf. Publ. No 494) Jun 2003
-
S. Viveros, "The economic impact of malicious code in wireless mobile networks," in 3G Mobile Communication Technologies, 2003. 3G 2003. 4th International Conference on (Conf. Publ. No. 494), Jun 2003, pp. 1-6.
-
(2003)
3G Mobile Communication Technologies
, pp. 1-6
-
-
Viveros, S.1
-
23
-
-
33744499088
-
Malicious code moves to mobile devices
-
December
-
N. Leavitt, "Malicious Code Moves to Mobile Devices," Computer, vol. 33, pp. 16-19, December 2000.
-
(2000)
Computer
, vol.33
, pp. 16-19
-
-
Leavitt, N.1
-
24
-
-
84861551458
-
-
[Online]
-
McAfee Labs, "2011 Threats Predictions," 2010. [Online]. Available: http://www.mcafee.com/ us/resources/reports/ rp-threat-predictions- 2011.pdf
-
(2010)
2011 Threats Predictions
-
-
-
25
-
-
79955408870
-
-
Semptember, [Online]
-
D. Barroso, "ZeuS Mitmo: Man-in-the-mobile," Semptember 2010. [Online]. Available: http:// securityblog.s21sec.com/2010/ 09/zeus-mitmo-man-in- mobile-i.html
-
(2010)
ZeuS Mitmo: Man-in-the-mobile
-
-
Barroso, D.1
-
26
-
-
84860308663
-
-
Feb. [Online], Security Bulletin Malware Evolution 2010
-
A. Gostev, "Kaspersky Security Bulletin. Malware Evolution 2010," Feb 2011. [Online]. Available: http: //www.securelist.com/en/ analysis/204792161/Kas- persky Security Bulletin Malware Evolution 2010
-
(2011)
Kaspersky Security Bulletin. Malware Evolution 2010
-
-
Gostev, A.1
-
27
-
-
84889069658
-
-
Jan, [Online]
-
Cisco, "Cisco 2010 Annual Security Report," Jan 2011. [Online]. Available: http://www.cisco.com/ en/US/prod/collateral/ vpndevc/security annual report 2010.pdf
-
(2011)
Cisco 2010 Annual Security Report
-
-
-
28
-
-
79960864218
-
-
PandaLabs, [Online]
-
PandaLabs, "Annual Report," 2011. [Online]. Available: http://press.pandasecurity.com/wp-content/uploads/2010/ 05/ PandaLabs-Annual- Report-2010.pdf
-
(2011)
Annual Report
-
-
-
29
-
-
84873713009
-
-
March 2011. [Online]. Available
-
Google Mobile Blog, "An Update on Android Market Security," March 2011. [Online]. Available: http://googlemobile.blogspot.com/ 2011/03/update-on-an- droid-market-security.html
-
An Update on Android Market Security
-
-
-
30
-
-
79951758149
-
-
[Online]
-
Sophos, "Security Threat Report," 2010. [Online]. Available: http://www.sophos.com/sophos/docs/eng/ papers/ sophos-security-threat-report- jan-2010-wpna.pdf
-
(2010)
Security Threat Report
-
-
-
31
-
-
80755124492
-
-
Juniper Networks Global Threat Center, [Online]
-
Juniper Networks Global Threat Center, "Malicious Mobile Threats Report 2010/2011," 2011. [Online]. Available: http://www.juniper.net/ us/en/local/pdf/whitepapers/2000415-en.pdf
-
(2011)
Malicious Mobile Threats Report 2010/2011
-
-
-
33
-
-
84923309529
-
MAISim: Mobile agent malware simulator
-
ser. Simutools '08. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
-
R. Leszczyna, I. N. Fovino, and M. Masera, "MAISim: mobile agent malware simulator," in Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, ser. Simutools '08. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008, pp. 35:1-35:6.
-
(2008)
Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops
, pp. 351-356
-
-
Leszczyna, R.1
Fovino, I.N.2
Masera, M.3
-
34
-
-
84863938862
-
-
European Network and Information Security Agency, 710 01 Heraklion - Crete - Greece, Tech. Rep., December
-
G. Hogben and M. Dekker, "Smartphones: Information security risks, opportunities and recommendations for users," European Network and Information Security Agency, 710 01 Heraklion - Crete - Greece, Tech. Rep., December 2010.
-
(2010)
Smartphones: Information Security Risks, Opportunities and Recommendations for Users
-
-
Hogben, G.1
Dekker, M.2
-
35
-
-
78650225509
-
Business risks and security assessment for mobile devices
-
Stevens Point, Wisconsin, USA: World Scientific and Engineering Academy and Society (WSEAS)
-
P. M. Milligan and D. Hutcheson, "Business risks and security assessment for mobile devices," in MCBE'07: Proceedings of the 8th Conference on 8th WSEAS Int. Conference on Mathematics and Computers in Business and Economics. Stevens Point, Wisconsin, USA: World Scientific and Engineering Academy and Society (WSEAS), 2007, pp. 189-193.
-
(2007)
MCBE'07: Proceedings of the 8th Conference on 8th WSEAS Int. Conference on Mathematics and Computers in Business and Economics
, pp. 189-193
-
-
Milligan, P.M.1
Hutcheson, D.2
-
36
-
-
80755181021
-
A survey of mobile malware in the wild
-
ser. SPSM '11. New York, NY, USA: ACM, [Online]
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A survey of mobile malware in the wild," in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM '11. New York, NY, USA: ACM, 2011, pp. 3-14. [Online]. Available: http://doi.acm.org/10.1145/ 2046614.2046618
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
37
-
-
63049091681
-
From desktop to mobile: Examining the security experience
-
[Online]
-
R. A. Botha, S. M. Furnell, and N. L. Clarke, "From desktop to mobile: Examining the security experience," Computers & Security, vol. 28, no. 3-4, pp. 130-137, 2009. [Online]. Available: http://www.sciencedirect. com/science/article/B6V8G- 4TYJTT6-1/2/ 335760cc014d6e724fd8d188942025e6
-
(2009)
Computers & Security
, vol.28
, Issue.3-4
, pp. 130-137
-
-
Botha, R.A.1
Furnell, S.M.2
Clarke, N.L.3
-
38
-
-
51949119464
-
-
Master's thesis, University of California, Santa Barbara
-
C. R. Mulliner, "Security of Smart Phones," Master's thesis, University of California, Santa Barbara, 2006.
-
(2006)
Security of Smart Phones
-
-
Mulliner, C.R.1
-
39
-
-
77958149861
-
-
Vrije Universiteit Amsterdam, Tech. Rep.
-
G. Portokalidis, P. Homburg, N. FitzRoy-Dale, K. Anagnostakis, and H. Bos, "Protecting smart phones by means of execution replication," Vrije Universiteit Amsterdam, Tech. Rep., 2009.
-
(2009)
Protecting Smart Phones by Means of Execution Replication
-
-
Portokalidis, G.1
Homburg, P.2
Fitzroy-Dale, N.3
Anagnostakis, K.4
Bos, H.5
-
40
-
-
80051969895
-
Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices
-
May
-
M. Becher, F. C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, and C.Wolf, "Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices," in Proceedings IEEE Security and Privacy, May 2011.
-
(2011)
Proceedings IEEE Security and Privacy
-
-
Becher, M.1
Freiling, F.C.2
Hoffmann, J.3
Holz, T.4
Uellenbeck, S.5
Wolf, C.6
-
41
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
ser. MobiVirt '08. New York, NY, USA: ACM
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, "Virtualized in-cloud security services for mobile devices," in Proceedings of the First Workshop on Virtualization in Mobile Computing, ser. MobiVirt '08. New York, NY, USA: ACM, 2008, pp. 31-35.
-
(2008)
Proceedings of the First Workshop on Virtualization in Mobile Computing
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
42
-
-
77951558980
-
When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments
-
ser. HotMobile '10. New York, NY, USA: ACM
-
J. Oberheide and F. Jahanian, "When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments," in Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, ser. HotMobile '10. New York, NY, USA: ACM, 2010, pp. 43-48.
-
(2010)
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
, pp. 43-48
-
-
Oberheide, J.1
Jahanian, F.2
-
43
-
-
78349253729
-
Towards dynamic malware analysis to increase mobile device security
-
M. Becher and F. C. Freiling, "Towards dynamic malware analysis to increase mobile device security," in Proc. of SICHERHEIT, 2008.
-
(2008)
Proc. of SICHERHEIT
-
-
Becher, M.1
Freiling, F.C.2
-
44
-
-
84873719768
-
Intrusion and anomaly detection in wireless networks
-
Y. Zhan, J. Zheng, and M. Ma, Eds. Information Science Publishing
-
A. Makhlouf and N. Boudriga, "Intrusion and anomaly detection in wireless networks," in Handbook of Research on Wireless Security, Y. Zhan, J. Zheng, and M. Ma, Eds. Information Science Publishing, 2008.
-
(2008)
Handbook of Research on Wireless Security
-
-
Makhlouf, A.1
Boudriga, N.2
-
46
-
-
77955118139
-
Mobile and ubiquitous malware
-
NewYork,NY, USA: ACM
-
Y. L. Ho and S.-H. Heng, "Mobile and ubiquitous malware," in MoMM '09: Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia. NewYork,NY, USA: ACM, 2009, pp. 559-563.
-
(2009)
MoMM '09: Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
, pp. 559-563
-
-
Ho, Y.L.1
Heng, S.-H.2
-
47
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
New York, NY, USA: ACM
-
A. Bose, X. Hu, K. G. Shin, and T. Park, "Behavioral detection of malware on mobile handsets," in MobiSys '08: Proceeding of the 6th international conference on Mobile systems, applications, and services. New York, NY, USA: ACM, 2008, pp. 225-238.
-
(2008)
MobiSys '08: Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
48
-
-
58349116007
-
Monitoring smartphones for anomaly detection
-
A.-D. Schmidt, F. Peters, F. Lamour, C. Scheel, S. A. Ç amtepe, and S. Albayrak, "Monitoring smartphones for anomaly detection," Mob. Netw. Appl., vol. 14, no. 1, pp. 92-106, 2009.
-
(2009)
Mob. Netw. Appl.
, vol.14
, Issue.1
, pp. 92-106
-
-
Schmidt, A.-D.1
Peters, F.2
Lamour, F.3
Scheel, C.4
Çamtepe, S.A.5
Albayrak, S.6
-
49
-
-
77952331717
-
PBMDS: A behaviorbased malware detection system for cellphone devices
-
Hoboken, New Jersey, USA, March 22-24 2010. ACM
-
L. Xie, X. Zhang, J.-P. Seifert, and S. Zhu, "pBMDS: a behaviorbased malware detection system for cellphone devices," in Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010. ACM, 2010, pp. 37-48.
-
(2010)
Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010
, pp. 37-48
-
-
Xie, L.1
Zhang, X.2
Seifert, J.-P.3
Zhu, S.4
-
50
-
-
84873743297
-
Towards dynamic malware analysis to increase mobile device security
-
ser. LNI, 128. GI
-
M. Becher and F. C. Freiling, "Towards Dynamic Malware Analysis to Increase Mobile Device Security," in Sicherheit 2008: Sicherheit, Schutz und Zuverl?assigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f?ur Informatik e.V. (GI), 2.- 4. April 2008 im Saarbr?ucker Schloss, ser. LNI, vol. 128. GI, 2008, pp. 423-433.
-
(2008)
Sicherheit 2008: Sicherheit, Schutz und Zuverl?assigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft F?ur Informatik E.V. (GI), 2.- 4. April 2008 im Saarbr?ucker Schloss
, pp. 423-433
-
-
Becher, M.1
Freiling, F.C.2
-
51
-
-
74049108559
-
On cellular botnets: Measuring the impact of malicious devices on a cellular network core
-
New York, NY, USA: ACM
-
P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, P. McDaniel, and T. La Porta, "On cellular botnets: measuring the impact of malicious devices on a cellular network core," in CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2009, pp. 223-234.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 223-234
-
-
Traynor, P.1
Lin, M.2
Ongtang, M.3
Rao, V.4
Jaeger, T.5
McDaniel, P.6
La Porta, T.7
-
52
-
-
33745796561
-
Exploiting open functionality in SMS-capable cellular networks
-
DOI 10.1145/1102120.1102171, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
W. Enck, P. Traynor, P. McDaniel, and T. La Porta, "Exploiting open functionality in SMS-capable cellular networks," in Proceedings of the 12th ACM conference on Computer and communications security, ser. CCS '05. New York, NY, USA: ACM, 2005, pp. 393-404. (Pubitemid 44022022)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 393-404
-
-
Enck, W.1
Traynor, P.2
McDaniel, P.3
Porta, T.L.4
-
53
-
-
78649952291
-
Security and denial of service threats in GSM networks
-
V. Bocan and V. Cretu, "Security and Denial of Service Threats in GSM Networks," Periodica Politechnica, Transactions on Automatic Control and Computer Science, vol. 49, no. 63, 2004.
-
(2004)
Periodica Politechnica, Transactions on Automatic Control and Computer Science
, vol.49
, Issue.63
-
-
Bocan, V.1
Cretu, V.2
-
54
-
-
33750358907
-
Malicious actions against the GPRS technology
-
DOI 10.1007/s11416-006-0021-1, Special Issue on Mobile Malware and Anti-malware technologies
-
C. Xenakis, "Malicious actions against the GPRS technology," Journal in Computer Virology, vol. 2, no. 2, pp. 121-133, 2006. (Pubitemid 44632012)
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.2
, pp. 121-133
-
-
Xenakis, C.1
-
55
-
-
0036086193
-
Partitioning attacks: Or how to rapidly clone some gsm cards
-
Washington, DC, USA: IEEE Computer Society
-
J. R. Rao, P. Rohatgi, H. Scherzer, and S. Tinguely, "Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards," in Proceedings of the 2002 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2002, pp. 31-.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 31
-
-
Rao, J.R.1
Rohatgi, P.2
Scherzer, H.3
Tinguely, S.4
-
56
-
-
78751649037
-
DoS attacks exploiting signaling in umts and ims
-
G. Kambourakis, C. Kolias, S. Gritzalis, and J. H. Park, "DoS attacks exploiting signaling in UMTS and IMS," Computer Communications, vol. 34, no. 3, pp. 226-235, 2011.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 226-235
-
-
Kambourakis, G.1
Kolias, C.2
Gritzalis, S.3
Park, J.H.4
-
57
-
-
34247390110
-
Proactive security for mobile messaging networks
-
DOI 10.1145/1161289.1161307, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
A. Bose and K. G. Shin, "Proactive security for mobile messaging networks," in WiSe '06: Proceedings of the 5th ACM workshop on Wireless security. New York, NY, USA: ACM, 2006, pp. 95-104. (Pubitemid 46634306)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 95-104
-
-
Bose, A.1
Shin, K.G.2
-
58
-
-
70349659420
-
A social network based patching scheme for worm containment in cellular networks
-
19-25 April 2009, Rio de Janeiro, Brazil
-
Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci, "A Social Network Based Patching Scheme for Worm Containment in Cellular Networks," in INFOCOM 2009. 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil, 2009, pp. 1476-1484.
-
(2009)
INFOCOM 2009. 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies
, pp. 1476-1484
-
-
Zhu, Z.1
Cao, G.2
Zhu, S.3
Ranjan, S.4
Nucci, A.5
-
59
-
-
50049087364
-
On mobile viruses exploiting messaging and bluetooth services
-
Sept 2006
-
A. Bose and K. G. Shin, "On Mobile Viruses Exploiting Messaging and Bluetooth Services," in Securecomm and Workshops, 2006, Sept 2006, pp. 1-10.
-
(2006)
Securecomm and Workshops
, pp. 1-10
-
-
Bose, A.1
Shin, K.G.2
-
60
-
-
11244304396
-
A man-in-The-middle attack on UMTS
-
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
-
U. Meyer and S. Wetzel, "A man-in-the-middle attack on UMTS," in Proceedings of the 3rd ACM workshop on Wireless security, ser. WiSe '04. New York, NY, USA: ACM, 2004, pp. 90-97. (Pubitemid 40062799)
-
(2004)
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
, pp. 90-97
-
-
Meyer, U.1
Wetzel, S.2
-
61
-
-
57749208412
-
Vulnerabilities of umts access domain security architecture
-
Washington, DC, USA: IEEE Computer Society
-
M. Khan, A. Ahmed, and A. R. Cheema, "Vulnerabilities of UMTS Access Domain Security Architecture," in Proceedings of the 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. Washington, DC, USA: IEEE Computer Society, 2008, pp. 350-355.
-
(2008)
Proceedings of the 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
, pp. 350-355
-
-
Khan, M.1
Ahmed, A.2
Cheema, A.R.3
-
63
-
-
33748991180
-
Modeling epidemic spreading in mobile environments
-
WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security
-
J. W. Mickens and B. D. Noble, "Modeling epidemic spreading in mobile environments," in WiSe '05: Proceedings of the 4th ACM workshop on Wireless security. New York, NY, USA: ACM, 2005, pp. 77-86. (Pubitemid 44447320)
-
(2005)
WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security
, pp. 77-86
-
-
Mickens, J.W.1
Noble, B.D.2
-
64
-
-
53949105871
-
The opportunistic transmission of wireless worms between mobile devices
-
[Online]
-
C. Rhodes and M. Nekovee, "The opportunistic transmission of wireless worms between mobile devices," Physica A: Statistical Mechanics and its Applications, vol. 387, no. 27, pp. 6837-6844, 2008. [Online]. Available: http://www.science- direct.com/science/ article/pii/S0378437108007772
-
(2008)
Physica A: Statistical Mechanics and Its Applications
, vol.387
, Issue.27
, pp. 6837-6844
-
-
Rhodes, C.1
Nekovee, M.2
-
65
-
-
57349123036
-
Can you infect me now?: Malware propagation in mobile phone networks
-
New York, NY, USA: ACM
-
C. Fleizach, M. Liljenstam, P. Johansson, G. M. Voelker, and A. Mehes, "Can you infect me now?: malware propagation in mobile phone networks," in WORM '07: Proceedings of the 2007 ACM workshop on Recurring malcode. New York, NY, USA: ACM, 2007, pp. 61-68.
-
WORM '07: Proceedings of the 2007 ACM Workshop on Recurring Malcode
, vol.2007
, pp. 61-68
-
-
Fleizach, C.1
Liljenstam, M.2
Johansson, P.3
Voelker, G.M.4
Mehes, A.5
-
66
-
-
34748827408
-
Bluetooth worm propagation: Mobility pattern matters!
-
DOI 10.1145/1229285.1229294, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
G. Yan, H. D. Flores, L. Cuellar, N. Hengartner, S. Eidenbenz, and V. Vu, "Bluetooth worm propagation: mobility pattern matters!" in ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security. New York, NY, USA: ACM, 2007, pp. 32-44. (Pubitemid 47479225)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 32-44
-
-
Yan, G.1
Flores, H.D.2
Cuellar, L.3
Hengartner, N.4
Eidenbenz, S.5
Vu, V.6
-
67
-
-
39049104692
-
Bluetooth worms: Models, dynamics, and defense implications
-
DOI 10.1109/ACSAC.2006.18, 4041171, Proceedings - Annual Computer Security Applications Conference, ACSAC
-
G. Yan and S. Eidenbenz, "Bluetooth Worms: Models, Dynamics, and Defense Implications," in ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference. Washington, DC, USA: IEEE Computer Society, 2006, pp. 245-256. (Pubitemid 351232919)
-
(2006)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 245-256
-
-
Yan, G.1
Eidenbenz, S.2
-
68
-
-
36348979829
-
Epidemics of mobile worms
-
DOI 10.1109/PCCC.2007.358929, 4197965, 27th IEEE International Performance Computing and Communications Conference, IPCCC 07
-
Y. Bulygin, "Epidemics of Mobile Worms," Performance, Computing, and Communications Conference, 2002. 21st IEEE International, vol. 0, pp. 475-478, 2007. (Pubitemid 350139332)
-
(2007)
Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference
, pp. 475-478
-
-
Bulygin, Y.1
-
69
-
-
47049091432
-
Analytical models for epidemics in mobile networks
-
Washington, DC, USA: IEEE Computer Society
-
J. W. Mickens and B. D. Noble, "Analytical Models for Epidemics in Mobile Networks," in WIMOB '07: Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. Washington, DC, USA: IEEE Computer Society, 2007, p. 77.
-
(2007)
WIMOB '07: Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
, pp. 77
-
-
Mickens, J.W.1
Noble, B.D.2
-
70
-
-
58849141571
-
Modeling propagation dynamics of bluetooth worms (extended version)
-
G. Yan and S. Eidenbenz, "Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)," IEEE Transactions on Mobile Computing, vol. 8, pp. 353-368, 2009.
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, pp. 353-368
-
-
Yan, G.1
Eidenbenz, S.2
-
71
-
-
34547218865
-
A preliminary investigation of worm infections in a bluetooth environment
-
DOI 10.1145/1179542.1179545, Proceedings of the 4th ACM Workshop on Recurring Malcode, WORM'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
J. Su, K. K. W. Chan, A. G. Miklas, K. Po, A. Akhavan, S. Saroiu, E. de Lara, and A. Goel, "A preliminary investigation of worm infections in a bluetooth environment," in WORM '06: Proceedings of the 4th ACM workshop on Recurring malcode. NewYork,NY, USA: ACM, 2006, pp. 9-16. (Pubitemid 47117518)
-
(2006)
Proceedings of the 4th ACM Workshop on Recurring Malcode, WORM'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 9-16
-
-
Su, J.1
Miklas, A.G.2
Po, K.3
Akhavan, A.4
Saroiu, S.5
De Lara, E.6
Goel, A.7
-
72
-
-
48749129898
-
On the effort to create smartphone worms in windows mobile
-
june
-
M. Becher, F. C. Freiling, and B. Leider, "On the Effort to Create Smartphone Worms in Windows Mobile," in Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC, june 2007, pp. 199-206.
-
(2007)
Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC
, pp. 199-206
-
-
Becher, M.1
Freiling, F.C.2
Leider, B.3
-
75
-
-
77955030814
-
Evaluating bluetooth as a medium for botnet command and control
-
ser. DIMVA'10. Berlin, Heidelberg: Springer-Verlag
-
K. Singh, S. Sangal, N. Jain, P. Traynor, and W. Lee, "Evaluating Bluetooth as a medium for botnet command and control," in Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment, ser. DIMVA'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 61-80.
-
(2010)
Proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 61-80
-
-
Singh, K.1
Sangal, S.2
Jain, N.3
Traynor, P.4
Lee, W.5
-
78
-
-
84872118819
-
An analysis of the ikee.b iphone botnet
-
ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, A. U. Schmidt, G. Russello, A. Lioy, N. R. Prasad, and S. Lian, Eds., Springer
-
P. A. Porras, H. Sa?idi, and V. Yegneswaran, "An Analysis of the iKee.B iPhone Botnet," in Security and Privacy in Mobile Information and Communication Systems - Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, A. U. Schmidt, G. Russello, A. Lioy, N. R. Prasad, and S. Lian, Eds., vol. 47. Springer, 2010, pp. 141-152.
-
(2010)
Security and Privacy in Mobile Information and Communication Systems - Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers
, vol.47
, pp. 141-152
-
-
Porras, P.A.1
Saidi, H.2
Yegneswaran, V.3
-
79
-
-
84873719036
-
Symbian worm yxes: Towards mobile botnets?
-
May
-
A. Apvrille, "Symbian Worm Yxes: Towards Mobile Botnets?" in The 19th EICAR Annual Conference, May 2010, pp. 31-54.
-
(2010)
The 19th EICAR Annual Conference
, pp. 31-54
-
-
Apvrille, A.1
-
80
-
-
84873741695
-
-
Feb, [Online]
-
M. Ballano, "Android Threats Getting Steamy," Feb 2011. [Online]. Available: http://www.symantec. com/connect/blogs/ android-threats-getting-steamy
-
(2011)
Android Threats Getting Steamy
-
-
Ballano, M.1
-
82
-
-
85040679345
-
-
[Online]
-
Techie Buzz, "Android Data Theft Vulnerability Detailed," 2011. [Online]. Available: http://techie-buzz.com/mobile-news/ android-data-theft- vulnerability-detailed.html
-
(2011)
Android Data Theft Vulnerability Detailed
-
-
-
84
-
-
78650596113
-
-
Black Hat DC, [Online]
-
N. Seriot, "iPhone Privacy," Black Hat DC, 2010. [Online]. Available: http://seriot.ch/resources/talks papers/iPhonePrivacy.pdf
-
(2010)
IPhone Privacy
-
-
Seriot, N.1
-
85
-
-
67649764018
-
A personal mobile drm manager for smartphones
-
S. Bhatt, R. Sion, and B. Carbunar, "A personal mobile DRM manager for smartphones," Computers & Security, vol. 28, no. 6, pp. 327-340, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.6
, pp. 327-340
-
-
Bhatt, S.1
Sion, R.2
Carbunar, B.3
-
86
-
-
12344300295
-
Privacy issues in location-aware mobile devices
-
Track 5 - Volume 5. Washington, DC, USA: IEEE Computer Society
-
R. P. Minch, "Privacy Issues in Location-Aware Mobile Devices," in Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 5 - Volume 5. Washington, DC, USA: IEEE Computer Society, 2004, pp. 50 127.2-.
-
(2004)
Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04)
, pp. 50-1272
-
-
Minch, R.P.1
-
87
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
ser. OSDI'10. Berkeley, CA, USA: USENIX Association
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, "TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones," in Proceedings of the 9th USENIX conference on Operating systems design and implementation, ser. OSDI'10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1-6.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
88
-
-
84888331381
-
PiOS: Detecting privacy leaks in ios applications
-
San Diego, CA, February
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna, "PiOS: Detecting Privacy Leaks in iOS Applications," in Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2011.
-
(2011)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
89
-
-
36749051752
-
IN safe hands: A review of mobile phone antitheft designs
-
S. Whitehead, J. Mailley, I. Storer, J. McCardle, G. Torrens, and G. Farrell, "IN SAFE HANDS: A Review of Mobile Phone Antitheft Designs," European Journal on Criminal Policy and Research, vol. 14, pp. 39-60, 2008.
-
(2008)
European Journal on Criminal Policy and Research
, vol.14
, pp. 39-60
-
-
Whitehead, S.1
Mailley, J.2
Storer, I.3
McCardle, J.4
Torrens, G.5
Farrell, G.6
-
90
-
-
80051984773
-
-
[Online]
-
A. Portnoy, "Pwn2Own 2010," 2010. [Online]. Available: http: //dvlabs.tippingpoint.com/blog/2010/ 02/15/pwn2own-2010
-
(2010)
Pwn2Own 2010
-
-
Portnoy, A.1
-
91
-
-
84923201020
-
Defending against sensor-sniffing attacks on mobile phones
-
ser. MobiHeld '09. New York, NY, USA: ACM
-
L. Cai, S. Machiraju, and H. Chen, "Defending against sensor-sniffing attacks on mobile phones," in Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds, ser. MobiHeld '09. New York, NY, USA: ACM, 2009, pp. 31-36.
-
(2009)
Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds
, pp. 31-36
-
-
Cai, L.1
MacHiraju, S.2
Chen, H.3
-
92
-
-
70349263625
-
Stealthy video capturer: A new video-based spyware in 3g smartphones
-
ser. WiSec '09. New York, NY, USA: ACM
-
N. Xu, F. Zhang, Y. Luo, W. Jia, D. Xuan, and J. Teng, "Stealthy video capturer: a new video-based spyware in 3G smartphones," in Proceedings of the second ACM conference on Wireless network security, ser. WiSec '09. New York, NY, USA: ACM, 2009, pp. 69-78.
-
(2009)
Proceedings of the Second ACM Conference on Wireless Network Security
, pp. 69-78
-
-
Xu, N.1
Zhang, F.2
Luo, Y.3
Jia, W.4
Xuan, D.5
Teng, J.6
-
93
-
-
84857164924
-
Soundminer: A stealthy and context-aware sound trojan for smartphones
-
Feb.
-
R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang, "Soundminer: A Stealthy and Context-Aware Sound Trojan for Smartphones," in Proceedings of the 18th Annual Network & Distributed System Security Symposium (NDSS), Feb. 2011.
-
(2011)
Proceedings of the 18th Annual Network & Distributed System Security Symposium (NDSS)
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
94
-
-
74049155830
-
On lightweight mobile phone application certification
-
New York, NY, USA: ACM
-
W. Enck, M. Ongtang, and P. McDaniel, "On lightweight mobile phone application certification," in CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2009, pp. 235-245.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
95
-
-
77950851532
-
Semantically rich application-centric security in android
-
Annual, dec.
-
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel, "Semantically Rich Application-Centric Security in Android," in Computer Security Applications Conference, 2009. ACSAC '09. Annual, dec. 2009, pp. 340-349.
-
(2009)
Computer Security Applications Conference, 2009. ACSAC '09
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
97
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
New York, NY, USA: ACM
-
H. Kim, J. Smith, and K. G. Shin, "Detecting energy-greedy anomalies and mobile malware variants," in MobiSys '08: Proceeding of the 6th international conference on Mobile systems, applications, and services. New York, NY, USA: ACM, 2008, pp. 239-252.
-
(2008)
MobiSys '08: Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
98
-
-
78650956193
-
Exploitation and threat analysis of open mobile devices
-
ser. ANCS '09. New York, NY, USA: ACM
-
L. Liu, X. Zhang, G. Yan, and S. Chen, "Exploitation and threat analysis of open mobile devices," in Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, ser. ANCS '09. New York, NY, USA: ACM, 2009, pp. 20-29.
-
(2009)
Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
, pp. 20-29
-
-
Liu, L.1
Zhang, X.2
Yan, G.3
Chen, S.4
-
99
-
-
50049091842
-
Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery
-
aug.
-
R. Racic, D. Ma, and H. Chen, "Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery," in Securecomm and Workshops, 2006, aug. 2006, pp. 1-10.
-
(2006)
Securecomm and Workshops, 2006
, pp. 1-10
-
-
Racic, R.1
Ma, D.2
Chen, H.3
-
100
-
-
3042685819
-
-
may-june
-
D. Johnston and J. Walker, "Overview of IEEE 802.16 security," Security Privacy, IEEE, vol. 2, no. 3, pp. 40-48, may-june 2004.
-
(2004)
Overview of IEEE 802.16 Security,", Security Privacy, IEEE
, vol.2
, Issue.3
, pp. 40-48
-
-
Johnston, D.1
Walker, J.2
-
102
-
-
85084164752
-
Injecting sms messages into smart phones for security analysis
-
Berkeley,CA,USA: USENIX Association
-
C. Mulliner and C. Miller, "Injecting SMS messages into smart phones for security analysis," in WOOT'09: Proceedings of the 3rd USENIX conference on Offensive technologies. Berkeley,CA,USA: USENIX Association, 2009, pp. 5-5.
-
(2009)
WOOT'09: Proceedings of the 3rd USENIX Conference on Offensive Technologies
, pp. 5-5
-
-
Mulliner, C.1
Miller, C.2
-
103
-
-
84873742791
-
-
McAfee, [Online]
-
McAfee, "WaveSecure," 2011. [Online]. Available: https://www. wavesecure.com/
-
(2011)
WaveSecure
-
-
-
104
-
-
84873714675
-
-
[Online]
-
Norton, "Norton Mobile Security Lite," 2011. [Online]. Available: http://us.norton.com/mobile-security/
-
(2011)
Norton Mobile Security Lite
-
-
-
105
-
-
84873702188
-
-
IIT-CNR, [Online]
-
IIT-CNR, "iCareMobile," 2011. [Online]. Available: http: //icaremobile.iit.cnr.it/
-
(2011)
ICareMobile
-
-
-
106
-
-
84873721466
-
-
[Online]
-
BullGuard Ltd, "BullGuard Mobile Security 10," 2011. [Online]. Available: http://www.bullguard.com
-
(2011)
BullGuard Mobile Security 10
-
-
-
107
-
-
84873731834
-
-
Kaspersky Lab ZAO, [Online]
-
Kaspersky Lab ZAO, "Kaspersky Mobile Security 9," 2011. [Online]. Available: http://www.kaspersky.com/kaspersky mobile security
-
(2011)
Kaspersky Mobile Security 9
-
-
-
108
-
-
84873731373
-
-
[Online]
-
ESET, "ESET Mobile Security," 2011. [Online]. Available: http: //www.eset.com/us/home/products/mobile-security/
-
(2011)
ESET Mobile Security
-
-
-
109
-
-
84873707572
-
-
[Online]
-
Lookout, "Lookout Mobile Security," 2011. [Online]. Available: https://www.mylookout.com
-
(2011)
Lookout Mobile Security
-
-
-
110
-
-
84885734839
-
Vulnerabilities and possible attacks against the gprs backbone network
-
ser. Lecture Notes in Computer Science, J. Lopez, Ed. Springer Berlin / Heidelberg
-
C. Xenakis and L. Merakos, "Vulnerabilities and Possible Attacks Against the GPRS Backbone Network," in Critical Information Infrastructures Security, ser. Lecture Notes in Computer Science, J. Lopez, Ed. Springer Berlin / Heidelberg, 2006, vol. 4347, pp. 262-272.
-
(2006)
Critical Information Infrastructures Security
, vol.4347
, pp. 262-272
-
-
Xenakis, C.1
Merakos, L.2
-
111
-
-
84873692516
-
Intrusion detection in cellular mobile networks
-
ser. Signals and Communication Technology, Y. Xiao, X. S. Shen, and D.-Z. Du, Eds. Springer US
-
B. Sun, Y. Xiao, and K. Wu, "Intrusion Detection in Cellular Mobile Networks," in Wireless Network Security, ser. Signals and Communication Technology, Y. Xiao, X. S. Shen, and D.-Z. Du, Eds. Springer US, 2007, pp. 183-210.
-
(2007)
Wireless Network Security
, pp. 183-210
-
-
Sun, B.1
Xiao, Y.2
Wu, K.3
-
113
-
-
77953137615
-
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
-
A. Shabtai, U. Kanonov, and Y. Elovici, "Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method," J. Syst. Softw., vol. 83, no. 8, pp. 1524-1537, 2010.
-
(2010)
J. Syst. Softw., Vol.
, vol.83
, Issue.8
, pp. 1524-1537
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
-
114
-
-
84255195597
-
Evaluation of anomaly-based ids for mobile devices using machine learning classifiers
-
[Online]
-
D. Damopoulos, S. A. Menesidou, G. Kambourakis, M. Papadaki, N. Clarke, and S. Gritzalis, "Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers," Security and Communication Networks, vol. 5, no. 1, pp. 3-14, 2012. [Online]. Available: http://dx.doi.org/10.1002/sec.341
-
(2012)
Security and Communication Networks
, vol.5
, Issue.1
, pp. 3-14
-
-
Damopoulos, D.1
Menesidou, S.A.2
Kambourakis, G.3
Papadaki, M.4
Clarke, N.5
Gritzalis, S.6
-
115
-
-
84856225193
-
"Andromaly": A behavioral malware detection framework for android devices
-
10.1007/s10844-010-0148-x. [Online]
-
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, ""Andromaly": a behavioral malware detection framework for android devices," Journal of Intelligent Information Systems, pp. 1-30, 2011, 10.1007/s10844-010-0148-x. [Online]. Available: http://dx.doi.org/10.1007/ s10844-010-0148-x
-
(2011)
Journal of Intelligent Information Systems
, pp. 1-30
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
116
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
ser. SPSM '11. New York, NY, USA: ACM, [Online]
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, "Crowdroid: behavior-based malware detection system for Android," in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM '11. New York, NY, USA: ACM, 2011, pp. 15-26. [Online]. Available: http://doi.acm.org/10.1145/2046614.2046619
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
117
-
-
36348943408
-
How mobile host batteries can improve network security
-
G. A. Jacoby, R. Marchany, and N. J. D. IV, "How Mobile Host Batteries Can Improve Network Security," IEEE Security and Privacy, vol. 4, pp. 40-49, 2006.
-
(2006)
IEEE Security and Privacy
, vol.4
, pp. 40-49
-
-
Jacoby, G.A.1
Marchany, R.2
Iv, N.J.D.3
-
118
-
-
76649138917
-
VirusMeter: Preventing your cellphone from spies
-
Berlin, Heidelberg: Springer-Verlag
-
L. Liu, G. Yan, X. Zhang, and S. Chen, "VirusMeter: Preventing Your Cellphone from Spies," in RAID '09: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 244-264.
-
(2009)
RAID '09: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
, pp. 244-264
-
-
Liu, L.1
Yan, G.2
Zhang, X.3
Chen, S.4
-
119
-
-
84863290640
-
On the potential of limitationoriented malware detection and prevention techniques on mobile phones
-
Jan
-
Q. Yan, R. H. Deng, Y. Li, and T. Li, "On the Potential of Limitationoriented Malware Detection and Prevention Techniques on Mobile Phones," International Journal of Security and Its Applications (IJSIA), vol. 4(1), pp. 21-30, Jan 2010.
-
(2010)
International Journal of Security and Its Applications (IJSIA)
, vol.4
, Issue.1
, pp. 21-30
-
-
Yan, Q.1
Deng, R.H.2
Li, Y.3
Li, T.4
-
120
-
-
79959290358
-
Intelligent virus detection on mobile devices
-
New York, NY, USA: ACM
-
D. Venugopal, G. Hu, and N. Roman, "Intelligent virus detection on mobile devices," in PST '06: Proceedings of the 2006 International Conference on Privacy, Security and Trust. New York, NY, USA: ACM, 2006, pp. 1-4.
-
(2006)
PST '06: Proceedings of the 2006 International Conference on Privacy, Security and Trust
, pp. 1-4
-
-
Venugopal, D.1
Hu, G.2
Roman, N.3
-
121
-
-
57349173904
-
A systematic approach for cell-phone worm containment
-
NewYork,USA: ACM
-
L. Xie, H. Song, T. Jaeger, and S. Zhu, "A systematic approach for cell-phone worm containment," in WWW '08: Proceeding of the 17th international conference on World Wide Web. NewYork,USA: ACM, 2008, pp. 1083-1084.
-
(2008)
WWW '08: Proceeding of the 17th International Conference on World Wide Web
, pp. 1083-1084
-
-
Xie, L.1
Song, H.2
Jaeger, T.3
Zhu, S.4
-
122
-
-
74949101283
-
Designing system-level defenses against cellphone malware
-
Washington, DC, USA: IEEE Computer Society
-
L. Xie, X. Zhang, A. Chaugule, T. Jaeger, and S. Zhu, "Designing System-Level Defenses against Cellphone Malware," in SRDS '09: Proceedings of the 2009 28th IEEE International Symposium on Reliable Distributed Systems. Washington, DC, USA: IEEE Computer Society, 2009, pp. 83-90.
-
(2009)
SRDS '09: Proceedings of the 2009 28th IEEE International Symposium on Reliable Distributed Systems
, pp. 83-90
-
-
Xie, L.1
Zhang, X.2
Chaugule, A.3
Jaeger, T.4
Zhu, S.5
-
123
-
-
70349663942
-
Defending mobile phones from proximity malware
-
19-25 April 2009, Rio de Janeiro, Brazil. IEEE
-
G. Zyba, G. M. Voelker, M. Liljenstam, A. M'ehes, and P. Johansson, "Defending Mobile Phones from Proximity Malware," in INFOCOM 2009. 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil. IEEE, 2009, pp. 1503-1511.
-
(2009)
INFOCOM 2009. 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies
, pp. 1503-1511
-
-
Zyba, G.1
Voelker, G.M.2
Liljenstam, M.3
M'Ehes, A.4
Johansson, P.5
-
124
-
-
78650393426
-
A probabilistic diffusion scheme for anomaly detection on smartphones
-
ser. Lecture Notes in Computer Science. Springer
-
C. Bauckhage, T. Alpcan, and A.-D. Schmidt, "A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones," in Proceedings of the Fourth International Workshop in Information Security Theory and Practice 2010 (WISTP'10), ser. Lecture Notes in Computer Science. Springer, 2010, pp. 31-46.
-
(2010)
Proceedings of the Fourth International Workshop in Information Security Theory and Practice 2010 (WISTP'10)
, pp. 31-46
-
-
Bauckhage, C.1
Alpcan, T.2
Schmidt, A.-D.3
-
125
-
-
14944379887
-
A behavioral approach to worm detection
-
WORM'04 - Proceedings of the 2004 ACM Workshop on Rapid Malcode
-
D. R. Ellis, J. G. Aiken, K. S. Attwood, and S. D. Tenaglia, "A behavioral approach to worm detection," in WORM '04: Proceedings of the 2004 ACM workshop on Rapid malcode. NewYork,NY, USA: ACM, 2004, pp. 43-53. (Pubitemid 40371959)
-
(2004)
WORM'04 - Proceedings of the 2004 ACM Workshop on Rapid Malcode
, pp. 43-53
-
-
Ellis, D.R.1
Aiken, J.G.2
Attwood, K.S.3
Tenaglia, S.D.4
-
126
-
-
57049188320
-
Enhancing java me security support with resource usage monitoring
-
ser. Lecture Notes in Computer Science, L. Chen, M. D. Ryan, and G. Wang, Eds., 5308. Springer
-
A. Castrucci, F. Martinelli, P. Mori, and F. Roperti, "Enhancing Java ME Security Support with Resource Usage Monitoring," in Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, ser. Lecture Notes in Computer Science, L. Chen, M. D. Ryan, and G. Wang, Eds., vol. 5308. Springer, 2008, pp. 256-266.
-
(2008)
Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings
, pp. 256-266
-
-
Castrucci, A.1
Martinelli, F.2
Mori, P.3
Roperti, F.4
-
127
-
-
37849002157
-
Securityby- contract: Toward a semantics for digital signatures on mobile code
-
ser. Lecture Notes in Computer Science, 4582. Springer
-
N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan, "Securityby- Contract: Toward a Semantics for Digital Signatures on Mobile Code," in Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, ser. Lecture Notes in Computer Science, vol. 4582. Springer, 2007, pp. 297-312.
-
(2007)
Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings
, pp. 297-312
-
-
Dragoni, N.1
Massacci, F.2
Naliuka, K.3
Siahaan, I.4
-
128
-
-
84879491639
-
Security-by-contract (sxc) for software and services of mobile systems
-
MIT press
-
N. Dragoni, F. Martinelli, F. Massacci, P. Mori, C. Schaefer, T. Walter, and E. Vetillard, "Security-by-Contract (SxC) for Software and Services of Mobile Systems," in At your service: Service Engineering in the Information Society Technologies Program. MIT press, 2008.
-
(2008)
At Your Service: Service Engineering in the Information Society Technologies Program.
-
-
Dragoni, N.1
Martinelli, F.2
Massacci, F.3
Mori, P.4
Schaefer, C.5
Walter, T.6
Vetillard, E.7
-
129
-
-
77952682763
-
Extending security-by-contract with quantitative trust on mobile devices
-
G. Costa, N. Dragoni, A. Lazouski, F. Martinelli, F. Massacci, and I. Matteucci, "Extending Security-by-Contract with Quantitative Trust on Mobile Devices," Complex, Intelligent and Software Intensive Systems, International Conference, vol. 0, pp. 872-877, 2010.
-
(2010)
Complex, Intelligent and Software Intensive Systems, International Conference
, pp. 872-877
-
-
Costa, G.1
Dragoni, N.2
Lazouski, A.3
Martinelli, F.4
Massacci, F.5
Matteucci, I.6
-
130
-
-
35448979944
-
SmartSiren: Virus detection and alert for smartphones
-
DOI 10.1145/1247660.1247690, MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
-
J. Cheng, S. H. Wong, H. Yang, and S. Lu, "SmartSiren: virus detection and alert for smartphones," in MobiSys '07: Proceedings of the 5th international conference on Mobile systems, applications and services. New York, NY, USA: ACM, 2007, pp. 258-271. (Pubitemid 47620930)
-
(2007)
MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
, pp. 258-271
-
-
Cheng, J.1
Wong, S.H.Y.2
Yang, H.3
Lu, S.4
-
131
-
-
36049030713
-
Quantifying the effectiveness of mobile phone virus response mechanisms
-
Washington, DC, USA: IEEE Computer Society
-
E. V. Ruitenbeek, T. Courtney, W. H. Sanders, and F. Stevens, "Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms," in DSN '07: Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. Washington, DC, USA: IEEE Computer Society, 2007, pp. 790-800.
-
(2007)
DSN '07: Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
, pp. 790-800
-
-
Ruitenbeek, E.V.1
Courtney, T.2
Sanders, W.H.3
Stevens, F.4
-
132
-
-
33751084887
-
Host-based intrusion detection for advanced mobile devices
-
DOI 10.1109/AINA.2006.192, 1620356, Proceedings - 20th International Conference on Advanced Information Networking and Applications
-
M. Miettinen and P. Halonen, "Host-Based Intrusion Detection for Advanced Mobile Devices," in AINA '06: Proceedings of the 20th International Conference on Advanced Information Networking and Applications. Washington, DC, USA: IEEE Computer Society, 2006, pp. 72-76. (Pubitemid 44761304)
-
(2006)
Proceedings - International Conference on Advanced Information Networking and Applications, AINA
, vol.2
, pp. 72-76
-
-
Miettinen, M.1
Halonen, P.2
Hatonen, K.3
-
133
-
-
33746453742
-
Using labeling to prevent cross-service attacks against smart phones
-
Detection of Intrusions and Malware and Vulnerability Assessment - Third International Conference, DIMVA 2006, Proceedings LNCS
-
C. Mulliner, G. Vigna, D. Dagon, and W. Lee, "Using Labeling to Prevent Cross-Service Attacks Against Smart Phones," in Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), ser. LNCS, vol. 4064. Berlin, Germany: Springer, July 2006, pp. 91-108. (Pubitemid 44124004)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4064
, pp. 91-108
-
-
Mulliner, C.1
Vigna, G.2
Dagon, D.3
Lee, W.4
-
135
-
-
77950125602
-
Detecting symbian os malware through static function call analysis
-
A.-D. Schmidt, J. H. Clausen, S. A. Camtepe, and S. Albayrak, "Detecting Symbian OS Malware through Static Function Call Analysis," in Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009). IEEE, 2009, pp. 15-22.
-
(2009)
Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009). IEEE
, pp. 15-22
-
-
Schmidt, A.-D.1
Clausen, J.H.2
Camtepe, S.A.3
Albayrak, S.4
-
136
-
-
70449482715
-
Static analysis of executables for collaborative malware detection on android
-
ICC 2009, Dresden, Germany, 14-18 June 2009. IEEE
-
A.-D. Schmidt, R. Bye, H.-G. Schmidt, J. H. Clausen, O. Kiraz, K. A. Y?uksel, S. A. Ç amtepe, and S. Albayrak, "Static Analysis of Executables for Collaborative Malware Detection on Android," in Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14-18 June 2009. IEEE, 2009, pp. 1-5.
-
(2009)
Proceedings of IEEE International Conference on Communications
, pp. 1-5
-
-
Schmidt, A.-D.1
Bye, R.2
Schmidt, H.-G.3
Clausen, J.H.4
Kiraz, O.5
Yuksel, K.A.6
Çamtepe, S.A.7
Albayrak, S.8
-
137
-
-
84873705577
-
Anomaly detection on mobile phone based operational behavior
-
T. Isohara, K. Takemori, and I. Sasase, "Anomaly Detection on Mobile Phone Based Operational Behavior," IPSJ Digital Courier, vol. 4, no. 0, pp. 9-17, 2008.
-
(2008)
IPSJ Digital Courier
, vol.4
, Issue.0
, pp. 9-17
-
-
Isohara, T.1
Takemori, K.2
Sasase, I.3
-
138
-
-
76649098286
-
Keystroke-based user identification on smart phones
-
ser. Lecture Notes in Computer Science, E. Kirda, S. Jha, and D. Balzarotti, Eds. Springer Berlin / Heidelberg
-
S. Zahid, M. Shahzad, S. Khayam, and M. Farooq, "Keystroke-Based User Identification on Smart Phones," in Recent Advances in Intrusion Detection, ser. Lecture Notes in Computer Science, E. Kirda, S. Jha, and D. Balzarotti, Eds. Springer Berlin / Heidelberg, 2009, vol. 5758, pp. 224-243.
-
(2009)
Recent Advances in Intrusion Detection
, vol.5758
, pp. 224-243
-
-
Zahid, S.1
Shahzad, M.2
Khayam, S.3
Farooq, M.4
-
139
-
-
26444504890
-
A mobile phone malicious software detection model with behavior checker
-
Web and Communication Technologies and Internet-Related Social Issues - HSI 2005: 3rd International Conference on Human.Society@Internet. Proceedings
-
T. S. Yap and H. T. Ewe, "A Mobile Phone Malicious Software Detection Model with Behavior Checker," in Web and Communication Technologies and Internet-Related Social Issues - HSI 2005, 3rd International Conference on Human.Society@Internet, Tokyo, Japan, July 27-29, 2005, Proceedings, ser. Lecture Notes in Computer Science, vol. 3597. Springer, 2005, pp. 57-65. (Pubitemid 41435937)
-
(2005)
Lecture Notes in Computer Science
, vol.3597
, pp. 57-65
-
-
Yap, T.S.1
Ewe, H.T.2
-
140
-
-
39049086351
-
Vulnerability analysis of mms user agents
-
ACSAC '06. 22nd Annual, dec.
-
C. Mulliner and G. Vigna, "Vulnerability Analysis of MMS User Agents," in Computer Security Applications Conference, 2006. ACSAC '06. 22nd Annual, dec. 2006, pp. 77-88.
-
(2006)
Computer Security Applications Conference, 2006
, pp. 77-88
-
-
Mulliner, C.1
Vigna, G.2
-
141
-
-
76649137567
-
SMS-watchdog: Profiling social behaviors of sms users for anomaly detection
-
Berlin, Heidelberg: Springer-Verlag
-
G. Yan, S. Eidenbenz, and E. Galli, "SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection," in RAID '09: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 202-223.
-
(2009)
RAID '09: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
, pp. 202-223
-
-
Yan, G.1
Eidenbenz, S.2
Galli, E.3
-
143
-
-
78651527844
-
An analysis of the robustness and stability of the network stack in symbian-based smartphones
-
S. M. Habib, C. Jacob, and T. Olovsson, "An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones," Journal of Networks, vol. 4, no. 10, pp. 968-975, 2009.
-
(2009)
Journal of Networks
, vol.4
, Issue.10
, pp. 968-975
-
-
Habib, S.M.1
Jacob, C.2
Olovsson, T.3
-
145
-
-
57349090300
-
-
[Online]
-
J. de Haas, "Symbian phone Security," 2005. [Online]. Available: http://www.blackhat.com/ presentations/bh-europe-05/ BH EU 05-deHaas.pdf
-
(2005)
Symbian Phone Security
-
-
De Haas, J.1
-
146
-
-
84867833971
-
Enhancing security of linuxbased android devices
-
Lehmann, Oct
-
A.-D. Schmidt, H.-G. Schmidt, J. Clausen, K. A. Yksel, O. Kiraz, A. Camtepe, and S. Albayrak, "Enhancing Security of Linuxbased Android Devices," in Proceedings of 15th International Linux Kongress. Lehmann, Oct 2008.
-
(2008)
Proceedings of 15th International Linux Kongress
-
-
Schmidt, A.-D.1
Schmidt, H.-G.2
Clausen, J.3
Yksel, K.A.4
Kiraz, O.5
Camtepe, A.6
Albayrak, S.7
-
147
-
-
77950172440
-
Smartphone malware evolution revisited: Android next target?
-
A.-D. Schmidt, H.-G. Schmidt, L. Batyuk, J. H. Clausen, S. A. Camtepe, S. Albayrak, and C. Yildizli, "Smartphone Malware Evolution Revisited: Android Next Target?" in Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009). IEEE, 2009, pp. 1-7.
-
(2009)
Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009). IEEE
, pp. 1-7
-
-
Schmidt, A.-D.1
Schmidt, H.-G.2
Batyuk, L.3
Clausen, J.H.4
Camtepe, S.A.5
Albayrak, S.6
Yildizli, C.7
-
148
-
-
77955207561
-
-
Technische Universit?at Berlin - DAI-Labor, Tech. Rep. TUB-DAI 08/08-02, Aug, [Online]
-
A.-D. Schmidt, R. Bye, H.-G. Schmidt, K. A. Yksel, O. Kiraz, J. Clausen, K. Raddatz, A. Camtepe, and S. Albayrak, "Monitoring Android for Collaborative Anomaly Detection: A First Architectural Draft," Technische Universit?at Berlin - DAI-Labor, Tech. Rep. TUB-DAI 08/08-02, Aug 2008. [Online]. Available: http://www. dai-labor.de/fileadmin/files/publications/080 8-02 DAI TechReport Monitoring Android.pdf
-
(2008)
Monitoring Android for Collaborative Anomaly Detection: A First Architectural Draft
-
-
Schmidt, A.-D.1
Bye, R.2
Schmidt, H.-G.3
Yksel, K.A.4
Kiraz, O.5
Clausen, J.6
Raddatz, K.7
Camtepe, A.8
Albayrak, S.9
-
149
-
-
60049085302
-
Understanding android security
-
January
-
W. Enck, M. Ongtang, and P. McDaniel, "Understanding Android Security," IEEE Security and Privacy, vol. 7, pp. 50-57, January 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
150
-
-
77950675112
-
Google android: A comprehensive security assessment
-
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer, "Google Android: A Comprehensive Security Assessment," IEEE Security and Privacy, vol. 8, pp. 35-44, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
151
-
-
77950673302
-
Securing android-powered mobile devices using selinux
-
May
-
A. Shabtai, Y. Fledel, and Y. Elovici, "Securing Android-Powered Mobile Devices Using SELinux," IEEE Security and Privacy, vol. 8, pp. 36-44, May 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 36-44
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
-
152
-
-
85025700509
-
A study of android application security
-
ser. SEC'11. Berkeley, CA, USA: USENIX Association, [Online]
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, "A study of Android application security," in Proceedings of the 20th USENIX conference on Security, ser. SEC'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 21-21. [Online]. Available: http://dl.acm.org/citation.cfm?id=2028067.2028088
-
(2011)
Proceedings of the 20th USENIX Conference on Security
, pp. 21-21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
153
-
-
78549255566
-
Behavior-based malware detection on mobile phone
-
Sept
-
S. Dai, Y. Liu, T. Wang, T. Wei, and W. Zou, "Behavior-Based Malware Detection on Mobile Phone," in Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference on, Sept 2010, pp. 1-4.
-
(2010)
Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference on
, pp. 1-4
-
-
Dai, S.1
Liu, Y.2
Wang, T.3
Wei, T.4
Zou, W.5
-
154
-
-
55849149078
-
Efficient anomaly detection system for mobile handsets
-
Washington, DC, USA: IEEE Computer Society
-
Y. Ikebe, T. Nakayama, M. Katagiri, S. Kawasaki, H. Abe, T. Shinagawa, and K. Kato, "Efficient Anomaly Detection System for Mobile Handsets," in SECURWARE '08: Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies. Washington, DC, USA: IEEE Computer Society, 2008, pp. 154-160.
-
(2008)
SECURWARE '08: Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies
, pp. 154-160
-
-
Ikebe, Y.1
Nakayama, T.2
Katagiri, M.3
Kawasaki, S.4
Abe, H.5
Shinagawa, T.6
Kato, K.7
-
156
-
-
79959568144
-
A trusted mobile phone reference architecture via secure kernel
-
NewYork, NY, USA: ACM
-
X. Zhang, O. Aciiçmez, and J.-P. Seifert, "A trusted mobile phone reference architecture via secure kernel," in STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computing. NewYork, NY, USA: ACM, 2007, pp. 7-14.
-
(2007)
STC '07: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, pp. 7-14
-
-
Zhang, X.1
Aciiçmez, O.2
Seifert, J.-P.3
-
157
-
-
57349085063
-
Measuring integrity on mobile phone systems
-
New York, NY, USA: ACM
-
D. Muthukumaran, A. Sawani, J. Schiffman, B. M. Jung, and T. Jaeger, "Measuring integrity on mobile phone systems," in SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies. New York, NY, USA: ACM, 2008, pp. 155-164.
-
(2008)
SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 155-164
-
-
Muthukumaran, D.1
Sawani, A.2
Schiffman, J.3
Jung, B.M.4
Jaeger, T.5
-
158
-
-
84881048895
-
Building efficient integrity measurement and attestation for mobile phone platforms
-
ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer
-
X. Zhang, O. Aciiçmez, and J.-P. Seifert, "Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms," in Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 17. Springer, 2009, pp. 71-82.
-
(2009)
Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers
, vol.17
, pp. 71-82
-
-
Zhang, X.1
Aciiçmez, O.2
Seifert, J.-P.3
-
161
-
-
85084162270
-
Design and implementation of a tcg-based integrity measurement architecture
-
ser. SSYM'04. Berkeley, CA, USA: USENIX Association
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a TCG-based integrity measurement architecture," in Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, ser. SSYM'04. Berkeley, CA, USA: USENIX Association, 2004, pp. 16-16.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, vol.13
, pp. 16-16
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
162
-
-
33748062337
-
PRIMA: Policy-Reduced Integrity Measurement Architecture
-
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
-
T. Jaeger, R. Sailer, and U. Shankar, "PRIMA: policy-reduced integrity measurement architecture," in SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies. New York, NY, USA: ACM, 2006, pp. 19-28. (Pubitemid 44300738)
-
(2006)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, vol.2006
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
163
-
-
51649107345
-
On the deployment of mobile trusted modules
-
IEEE, mar.
-
A. U. Schmidt, N. Kuntze, and M. Kasper, "On the Deployment of Mobile Trusted Modules," in Wireless Communications and Network ing Conference, 2008. WCNC 2008. IEEE, mar. 2008, pp. 3169-3174.
-
(2008)
Wireless Communications and Network Ing Conference, 2008. WCNC 2008.
, pp. 3169-3174
-
-
Schmidt, A.U.1
Kuntze, N.2
Kasper, M.3
-
164
-
-
51849168710
-
Reassessing the tcg specifications for trusted computing in mobile and embedded systems
-
Washington, DC, USA: IEEE Computer Society
-
J. Grossschadl, T. Vejda, and D. Page, "Reassessing the TCG specifications for trusted computing in mobile and embedded systems," in Proceedings of the 2008 IEEE International Workshop on Hardware- Oriented Security and Trust. Washington, DC, USA: IEEE Computer Society, 2008, pp. 84-90.
-
(2008)
Proceedings of the 2008 IEEE International Workshop on Hardware- Oriented Security and Trust
, pp. 84-90
-
-
Grossschadl, J.1
Vejda, T.2
Page, D.3
-
165
-
-
51949085080
-
A trusted mobile phone prototype
-
CCNC 2008. 5th IEEE, jan.
-
O. Aciiçmez, A. Latifi, J.-P. Seifert, and X. Zhang, "A Trusted Mobile Phone Prototype," in Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE, jan. 2008, pp. 1208-1209.
-
(2008)
Consumer Communications and Networking Conference, 2008
, pp. 1208-1209
-
-
Aciiçmez, O.1
Latifi, A.2
Seifert, J.-P.3
Zhang, X.4
|