메뉴 건너뛰기




Volumn 37, Issue , 2013, Pages 215-227

Secloud: A cloud-based comprehensive and lightweight security solution for smartphones

Author keywords

Cloud computing; Energy aware security; Intrusion detection; Real time intrusion response; Smartphone security

Indexed keywords

CLOUD COMPUTING; INTRUSION DETECTION; MERCURY (METAL); POWER MANAGEMENT; SECURITY SYSTEMS; SIGNAL ENCODING; SMARTPHONES;

EID: 84884907087     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2013.02.002     Document Type: Article
Times cited : (66)

References (44)
  • 1
    • 85066547364 scopus 로고    scopus 로고
    • Android application repository, http://www.androidpolice.com/2011/03/01/; 2011.
  • 4
    • 0036749185 scopus 로고    scopus 로고
    • Behavior-based intrusion detection in mobile phone systems
    • Boukerche A, Notare M. Behavior-based intrusion detection in mobile phone systems. Journal Parallel & Distributed Computing 2002; 62(9):1476-90.
    • (2002) Journal Parallel & Distributed Computing , vol.62 , Issue.9 , pp. 1476-1490
    • Boukerche, A.1    Notare, M.2
  • 7
    • 53349116756 scopus 로고    scopus 로고
    • Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
    • IEEE
    • Chen X, Andersen J, Mao Z., Bailey M, Nazario J. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In: DSN. IEEE; 2008. P. 177-86.
    • (2008) DSN , pp. 177-186
    • Chen, X.1    Andersen, J.2    Mao, Z.3    Bailey, M.4    Nazario, J.5
  • 8
    • 35448979944 scopus 로고    scopus 로고
    • Smartsiren: Virus detection and alert for smartphones. In: Proceedings of the 5th international conference on mobile systems, applications and services
    • Cheng J, Wong S, Yang H., Lu S. Smartsiren: Virus detection and alert for smartphones. In: Proceedings of the 5th international conference on mobile systems, applications and services. ACM; 2007. P. 258-71.
    • (2007) ACM , pp. 258-271
    • Cheng, J.1    Wong, S.2    Yang, H.3    Lu, S.4
  • 9
    • 10944254818 scopus 로고    scopus 로고
    • Mobile phones as computing devices: The viruses are coming!
    • DOI 10.1109/MPRV.2004.21
    • Dagon D, Martin T, Starner T. Mobile phones as computing devices: the viruses are coming! IEEE Pervasive Computing 2004; 3:11-5. (Pubitemid 40010893)
    • (2004) IEEE Pervasive Computing , vol.3 , Issue.4 , pp. 11-15
    • Dagon, D.1    Martin, T.2    Starner, T.3
  • 19
    • 84874837538 scopus 로고    scopus 로고
    • Smart-phone attacks and defenses
    • Guo C, Wang HJ, Zhu W. Smart-phone attacks and defenses. In: Hot Nets III; 2004.
    • (2004) Hot Nets , vol.3
    • Guo, C.1    Wang, H.J.2    Zhu, W.3
  • 20
    • 80052184968 scopus 로고    scopus 로고
    • A cloud-based intrusion detection and response system for mobile phones
    • IEEE/IFIP 41st international conference on IEEE
    • Houmansadr A, Zonouz S, Berthier R. A cloud-based intrusion detection and response system for mobile phones. In: Dependable Systems and Networks Workshops (DSN-W); 2011. P. 31-2. IEEE/IFIP 41st international conference on IEEE, 2011.
    • (2011) Dependable Systems and Networks Workshops (DSN-W); 2011 , pp. 31-32
    • Houmansadr, A.1    Zonouz, S.2    Berthier, R.3
  • 21
    • 85066598887 scopus 로고    scopus 로고
    • Kaspersky mobile security, http://www.kaspersky.com/mobile-downloads/; 2011.
    • (2011)
  • 22
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection. In: Proceedings of the 13th conference on USENIX security symposium
    • 19
    • Kim H, Karp B. Autograph: toward automated, distributed worm signature detection. In: Proceedings of the 13th conference on USENIX security symposium. Berkeley, CA, USA: USENIX Association; 2004. p. 19. 19.
    • (2004) Berkeley, CA, USA: USENIX Association; , pp. 19
    • Kim, H.1    Karp, B.2
  • 24
    • 33645791274 scopus 로고    scopus 로고
    • Honeycomb: Creating intrusion detection signatures using honeypots
    • Kreibich C, Crowcroft J. Honeycomb: creating intrusion detection signatures using honeypots. SIGCOMM CCR 2004; 34:51-6.
    • (2004) Sigcomm Ccr , vol.34 , pp. 51-56
    • Kreibich, C.1    Crowcroft, J.2
  • 27
    • 85066515096 scopus 로고    scopus 로고
    • V. Library. .
  • 28
    • 76649138917 scopus 로고    scopus 로고
    • Virusmeter: Preventing your cellphone from spies
    • Springer
    • Liu L, Yan G, Zhang X., Chen S. Virusmeter: preventing your cellphone from spies. In: RAID. Springer; 2009. P. 244-64.
    • (2009) RAID , pp. 244-264
    • Liu, L.1    Yan, G.2    Zhang, X.3    Chen, S.4
  • 30
    • 85077723796 scopus 로고    scopus 로고
    • Cloudav: N-version antivirus in the network cloud
    • van Oorschot PC, editor USENIX Association
    • Oberheide J, Cooke E, Jahanian F. Cloudav: N-version antivirus in the network cloud. In: van Oorschot PC, editor. USENIX security symposium. USENIX Association; 2008a. P. 91-106.
    • (2008) USENIX Security Symposium , pp. 91-106
    • Oberheide, J.1    Cooke, E.2    Jahanian, F.3
  • 33
    • 84872118819 scopus 로고    scopus 로고
    • An analysis of the iKeeB iPhone botnet
    • Porras P, Saidi H, Yegneswaran V. An analysis of the iKeeB iPhone botnet. MobiSec 2010:141-52.
    • (2010) MobiSec , pp. 141-152
    • Porras, P.1    Saidi, H.2    Yegneswaran, V.3
  • 35
    • 50049091842 scopus 로고    scopus 로고
    • Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery
    • Racic R. Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery. In: SecureComm; 2006. P. 1-10.
    • (2006) SecureComm; , pp. 1-10
    • Racic, R.1
  • 37
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • Roesch M. Snort: lightweight intrusion detection for networks. In: USENIX-LISA; 1999. P. 229-38.
    • (1999) Usenix-lisa , pp. 229-238
    • Roesch, M.1
  • 42
    • 26444504890 scopus 로고    scopus 로고
    • A mobile phone malicious software detection model with behavior checker
    • Web and Communication Technologies and Internet-Related Social Issues - HSI 2005: 3rd International Conference on Human.Society@Internet. Proceedings
    • Yap TS, Ewe HT A mobile phone malicious software detection model with behavior checker. In: Web and communication technologies and Internet-related social issues, Vol. 3597; 2005. P. 57-65. (Pubitemid 41435937)
    • (2005) Lecture Notes in Computer Science , vol.3597 , pp. 57-65
    • Yap, T.S.1    Ewe, H.T.2
  • 43
  • 44
    • 28044469549 scopus 로고    scopus 로고
    • The monitoring and early detection of internet worms
    • DOI 10.1109/TNET.2005.857113
    • Zou CC, Gong W, Towsley D., Gao L. The monitoring and early detection of internet worms. IEEE/ACM Trans. Netw 2005; 13: 961-74. (Pubitemid 41685008)
    • (2005) IEEE/ACM Transactions on Networking , vol.13 , Issue.5 , pp. 961-974
    • Zou, C.C.1    Gong, W.2    Towsley, D.3    Gao, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.