메뉴 건너뛰기




Volumn , Issue , 2013, Pages 469-480

Sensing-enabled channels for hard-to-detect command and control of mobile devices

Author keywords

command control; covert channel; mobile device sensors; mobile malware; mobile security

Indexed keywords

ANDROID APPLICATIONS; COMMAND AND CONTROL; COVERT CHANNELS; MOBILE COMPUTING DEVICES; MOBILE MALWARE; MOBILE SECURITY; TRADITIONAL SERVICES; WIRELESS COMMUNICATION NETWORK;

EID: 84877985630     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2484313.2484373     Document Type: Conference Paper
Times cited : (50)

References (50)
  • 3
    • 84875654471 scopus 로고    scopus 로고
    • Available at
    • Mobile Threat Report. Available at http://bit.ly/ImefoN/.
    • Mobile Threat Report
  • 4
    • 84877940401 scopus 로고    scopus 로고
    • Available at
    • PPLive. Available at http://www.synacast.com/en/.
    • PPLive
  • 9
    • 0344878694 scopus 로고    scopus 로고
    • Radiofrequency interference with medical devices: A technical information statement
    • H. Bassen. Radiofrequency interference with medical devices. a technical information statement. IEEE Engineering in Medicine and Biology, 17(3):111-114, 1998. (Pubitemid 28240551)
    • (1998) IEEE Engineering in Medicine and Biology Magazine , vol.17 , Issue.3 , pp. 111-114
    • Bassen, H.I.1
  • 10
    • 84970901426 scopus 로고    scopus 로고
    • Touchlogger: Inferring keystrokes on touch screen from smartphone motion
    • L. Cai and H. Chen. Touchlogger: inferring keystrokes on touch screen from smartphone motion. In Proc. of USENIX HotSec, 2011.
    • Proc. of USENIX HotSec, 2011
    • Cai, L.1    Chen, H.2
  • 12
    • 66649129942 scopus 로고    scopus 로고
    • The pollution attack in p2p live video streaming: Measurement results and defenses
    • P. Dhungel, X. Hei, K. W. Ross, and N. Saxena. The pollution attack in p2p live video streaming: measurement results and defenses. In Proc. of P2P-TV, 2007.
    • Proc. of P2P-TV, 2007
    • Dhungel, P.1    Hei, X.2    Ross, K.W.3    Saxena, N.4
  • 14
    • 70349193896 scopus 로고    scopus 로고
    • Audio steganography for covert data transmissions by imperceptible tone insertion
    • Available at
    • K. Gopalan and S. Wenndt. Audio steganography for covert data transmissions by imperceptible tone insertion. In Communication systems and applications, Available at http://qcn.stanford.edu/, 2004.
    • (2004) Communication Systems and Applications
    • Gopalan, K.1    Wenndt, S.2
  • 17
    • 77249113101 scopus 로고    scopus 로고
    • Harris Interactive. Available at
    • Harris Interactive. Teenagers: A Generation Unplugged. Available at http://bit.ly/IyH71E, 2008.
    • (2008) Teenagers: A Generation Unplugged
  • 19
    • 84870431329 scopus 로고    scopus 로고
    • A sms-based mobile botnet using flooding algorithm
    • J. Hua and K. Sakurai. A sms-based mobile botnet using flooding algorithm. In Proc. of WISTP, 2011.
    • Proc. of WISTP, 2011
    • Hua, J.1    Sakurai, K.2
  • 20
    • 79955468168 scopus 로고    scopus 로고
    • Influence of user perception, security needs, and social factors on device pairing method choices
    • I. Ion, M. Langheinrich, P. Kumaraguru, and S. Capkun. Influence of user perception, security needs, and social factors on device pairing method choices. In Proc. of SOUPS, 2010.
    • Proc. of SOUPS, 2010
    • Ion, I.1    Langheinrich, M.2    Kumaraguru, P.3    Capkun, S.4
  • 21
    • 85091899871 scopus 로고    scopus 로고
    • Retroactive detection of malware with applications to mobile platforms
    • M. Jakobsson and K. Johansson. Retroactive detection of malware with applications to mobile platforms. In Proc. of USENIX HotSec, 2010.
    • Proc. of USENIX HotSec, 2010
    • Jakobsson, M.1    Johansson, K.2
  • 22
    • 79958168340 scopus 로고    scopus 로고
    • Two heads are better than one: Security and usability of device associations in group scenarios
    • R. Kainda, I. Flechais, and A. W. Roscoe. Two heads are better than one: Security and usability of device associations in group scenarios. In Proc. of SOUPS, pages 1-13, 2010.
    • (2010) Proc. of SOUPS , pp. 1-13
    • Kainda, R.1    Flechais, I.2    Roscoe, A.W.3
  • 23
    • 57349195106 scopus 로고    scopus 로고
    • Detecting energy-greedy anomalies and mobile malware variants
    • ACM
    • H. Kim, J. Smith, and K. G. Shin. Detecting energy-greedy anomalies and mobile malware variants. In Proc. of MobiSys. ACM, 2008.
    • (2008) Proc. of MobiSys.
    • Kim, H.1    Smith, J.2    Shin, K.G.3
  • 26
    • 84861598862 scopus 로고    scopus 로고
    • Can open wifi networks be lethal weapons for botnets?
    • to appear
    • M. Knysz, X. Hu, Y. Zeng, and K. G. Shin. Can open wifi networks be lethal weapons for botnets? In Proc. of INFOCOM, to appear, 2012.
    • (2012) Proc. of INFOCOM
    • Knysz, M.1    Hu, X.2    Zeng, Y.3    Shin, K.G.4
  • 29
    • 84904466354 scopus 로고    scopus 로고
    • College Student's Hand-phone Usage Culture Survey
    • D. Lee. College Student's Hand-phone Usage Culture Survey. In University Culture Newspaper, 2002.
    • (2002) University Culture Newspaper
    • Lee, D.1
  • 34
    • 80755143996 scopus 로고    scopus 로고
    • (sp)iPhone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
    • P. Marquardt, A. Verma, H. Carter, and P. Traynor. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers. In Proc. of ACM CCS, 2011.
    • Proc. of ACM CCS, 2011
    • Marquardt, P.1    Verma, A.2    Carter, H.3    Traynor, P.4
  • 43
    • 84877997420 scopus 로고    scopus 로고
    • Authentication technologies for the blind or visually impaired
    • N. Saxena and J. H. Watt. Authentication technologies for the blind or visually impaired. In Proc. of USENIX HotSec, 2009.
    • Proc. of USENIX HotSec, 2009
    • Saxena, N.1    Watt, J.H.2
  • 48
    • 79957956581 scopus 로고    scopus 로고
    • America's Cellular Telephone Obsession: New Geographies of Personal Communication
    • T. A. Wikle. America's Cellular Telephone Obsession: New Geographies of Personal Communication. In Journal of American and Comparative Cultures, 2001.
    • (2001) Journal of American and Comparative Cultures
    • Wikle, T.A.1
  • 50
    • 84860677644 scopus 로고    scopus 로고
    • Design of SMS commanded and controlled and P2P structured mobile botnets
    • Y. Zeng, K. Shin, and X. Hu. Design of SMS commanded and controlled and P2P structured mobile botnets. In Proc. of ACM WiSec, 2012.
    • Proc. of ACM WiSec, 2012
    • Zeng, Y.1    Shin, K.2    Hu, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.