메뉴 건너뛰기




Volumn 19, Issue 1, 2014, Pages 79-87

Quantifying and classifying covert communications on android

Author keywords

Android smartphones; Covert communication; Security

Indexed keywords


EID: 84894862758     PISSN: 1383469X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11036-013-0482-7     Document Type: Article
Times cited : (2)

References (24)
  • 1
    • 84876542471 scopus 로고    scopus 로고
    • From keyloggers to touchloggers: Take the rough with the smooth
    • doi: 10.1016/j.cose.2012.10.002
    • Damopoulos D, Kambourakis G, Gritzalis S (2013) From keyloggers to touchloggers: Take the rough with the smooth. Comput Sec 32(0):102-114. doi: 10.1016/j.cose.2012.10.002. http://www.sciencedirect.com/science/article/pii/ S0167404812001654
    • (2013) Comput Sec , vol.32 , pp. 102-114
    • Damopoulos, D.1    Kambourakis, G.2    Gritzalis, S.3
  • 2
    • 84894715460 scopus 로고    scopus 로고
    • Android
    • Android (2012) Settings system. http://developer.android.com/reference/ android/provider/Settings.System.html
    • (2012) Settings System
  • 10
    • 60049085302 scopus 로고    scopus 로고
    • Understanding android security
    • 10.1109/MSP.2009.26
    • Enck W, Ongtang M, McDaniel P (2009) Understanding android security. IEEE Secur Privacy 7(1):50-57
    • (2009) IEEE Secur Privacy , vol.7 , Issue.1 , pp. 50-57
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 14
    • 84976667065 scopus 로고
    • Shared resource matrix methodology: An approach to identifying storage and timing channels
    • 10.1145/357369.357374
    • Kemmerer R (1983) Shared resource matrix methodology: an approach to identifying storage and timing channels. ACM Trans Comput Syst (TOCS) 1(3):256-277
    • (1983) ACM Trans Comput Syst (TOCS) , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.1
  • 16
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • 10.1145/362375.362389
    • Lampson B (1973) A note on the confinement problem. Commun ACM 16(10):613-615
    • (1973) Commun ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 20
    • 84856225193 scopus 로고    scopus 로고
    • Andromaly: A behavioral malware detection framework for android devices
    • 10.1007/s10844-010-0148-x 10.1007/s10844-010-0148-x
    • Shabtai A, Kanonov U, Elovici Y, Glezer C, Weiss Y (2012) Andromaly: a behavioral malware detection framework for android devices. J Intell Inf Syst 38(1):161-190. doi: 10.1007/s10844-010-0148-x
    • (2012) J Intell Inf Syst , vol.38 , Issue.1 , pp. 161-190
    • Shabtai, A.1    Kanonov, U.2    Elovici, Y.3    Glezer, C.4    Weiss, Y.5
  • 21
    • 33645958853 scopus 로고    scopus 로고
    • New constructive approach to covert channel modeling and channel capacity estimation
    • Wang Z, Lee R (2005) New constructive approach to covert channel modeling and channel capacity estimation. Inf Secur: 498-505
    • (2005) Inf Secur , pp. 498-505
    • Wang, Z.1    Lee, R.2
  • 23
    • 85060493868 scopus 로고    scopus 로고
    • Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
    • USENIX Association Berkeley
    • Yan LK, Yin H (2012) Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In: Proceedings of the 21st USENIX conference on security symposium, Security'12. USENIX Association, Berkeley, pp 29-29. http://dl.acm.org/citation.cfm?id=2. 3627932362822
    • (2012) Proceedings of the 21st USENIX Conference on Security Symposium, Security'12 , pp. 29-29
    • Yan, L.K.1    Yin, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.