메뉴 건너뛰기




Volumn 16, Issue 2, 2014, Pages 961-987

Evolution, detection and analysis of malware for smart devices

Author keywords

grayware; malware; privacy; security; smart devices; smartphones

Indexed keywords

COMPUTER CRIME; DATA PRIVACY; PERSONAL COMPUTERS; SMARTPHONES;

EID: 84901246064     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2013.101613.00077     Document Type: Article
Times cited : (194)

References (165)
  • 2
    • 84866720156 scopus 로고    scopus 로고
    • Juniper Juniper Networks Tech. Rep.
    • Juniper, "2011 mobile threats report," Juniper Networks, Tech. Rep., 2012.
    • (2012) 2011 Mobile Threats Report
  • 6
    • 84901201616 scopus 로고    scopus 로고
    • Samsung. (Visited March 2013) Samsung smart tv. [Online]
    • Samsung. (Visited March 2013) Samsung smart tv. [Online]. Available: http://www.samsung.com/us/2012-smart-tv/
  • 7
    • 84901201617 scopus 로고    scopus 로고
    • Sony. (Visited March 2013) Smartwatch. [Online]
    • Sony. (Visited March 2013) Smartwatch. [Online]. Available: http://www.sonymobile.com/us/products/accessories/smartwatch/
  • 8
    • 84901201607 scopus 로고    scopus 로고
    • Google. (Visited March 2013) Google glass. [Online]. Available
    • Google. (Visited March 2013) Google glass. [Online]. Available: http://http://www.google.com/glass/
  • 9
    • 84901201608 scopus 로고    scopus 로고
    • CuteCircuit. (Visited March 2013) T-shirtos: The future is getting closer. [Online]
    • CuteCircuit. (Visited March 2013) T-shirtos: The future is getting closer. [Online]. Available: http://www.cutecircuit.com/tshirtos-the-future-is- getting-closer/
  • 10
    • 84901201609 scopus 로고    scopus 로고
    • (Visited March 2013) Weblink aims to bridge the nagging smartphone-car disconnect. [Online]. Available
    • D. Newcomb. (Visited March 2013) Weblink aims to bridge the nagging smartphone-car disconnect. [Online]. Available: http://www.wired.com/autopia/ 2013/03/weblink-abalta-auto-apps/
    • Newcomb, D.1
  • 11
    • 84865420460 scopus 로고    scopus 로고
    • Smartphones and tablets in the hospital environment
    • S. Larner, "Smartphones and tablets in the hospital environment," British J. of Healthcare Management, vol. 18, no. 8, pp. 404-405, 2012.
    • (2012) British J. of Healthcare Management , vol.18 , Issue.8 , pp. 404-405
    • Larner, S.1
  • 12
    • 84901201610 scopus 로고    scopus 로고
    • IIH. (Visited March 2013) Smart pillbox. [Online]
    • IIH. (Visited March 2013) Smart pillbox. [Online]. Available: http://www.innovatorsinhealth.org/solutions/
  • 14
    • 84901201600 scopus 로고    scopus 로고
    • (Visited March 2013) Asymco. [Online]. Available
    • H. Dediu, D. Schmidt, and R. Salle. (Visited March 2013) Asymco. [Online]. Available: http://www.asymco.com/
    • Dediu, H.1    Schmidt, D.2    Salle, R.3
  • 15
    • 84901201601 scopus 로고    scopus 로고
    • (Visited May 2013) Back from the dead: why do 2013's best smartphones have ir blasters? [Online]. Available
    • D. Seifert. (Visited May 2013) Back from the dead: why do 2013's best smartphones have ir blasters? [Online]. Available: http://www.theverge.com/2013/ 4/24/4262074/is-this-the-year-of-the-ir-blaster
    • Seifert, D.1
  • 16
    • 84863229655 scopus 로고    scopus 로고
    • Networked wireless sensor data collection: Issues, challenges, and approaches
    • F. Wang and J. Liu, "Networked wireless sensor data collection: Issues, challenges, and approaches," IEEE Commun. Surveys & Tutorials, vol. 13, no. 4, pp. 673-687, 2011.
    • (2011) IEEE Commun. Surveys & Tutorials , vol.13 , Issue.4 , pp. 673-687
    • Wang, F.1    Liu, J.2
  • 17
    • 84873743210 scopus 로고    scopus 로고
    • A survey on smart grid communication infrastructures: Motivations, requirements and challenges
    • Y. Yan, Y Qian, H. Sharif, and D. Tipper, "A survey on smart grid communication infrastructures: Motivations, requirements and challenges," IEEE Commun. Surveys & Tutorials, vol. 15, no. 1, pp. 5-20, 2013.
    • (2013) IEEE Commun. Surveys & Tutorials , vol.15 , Issue.1 , pp. 5-20
    • Yan, Y.1    Qian, Y.2    Sharif, H.3    Tipper, D.4
  • 18
    • 70350571016 scopus 로고    scopus 로고
    • A survey of indoor positioning systems for wireless personal networks
    • Y Gu, A. Lo, and I. Niemegeers, "A survey of indoor positioning systems for wireless personal networks," IEEE Commun. Surveys & Tutorials, vol. 11, no. 1, pp. 13-32, 2009.
    • (2009) IEEE Commun. Surveys & Tutorials , vol.11 , Issue.1 , pp. 13-32
    • Gu, Y.1    Lo, A.2    Niemegeers, I.3
  • 19
    • 84901201602 scopus 로고    scopus 로고
    • (Visited Agoust 2013) Sony's smarttags could change phone habits. [Online]. Available
    • C. MacManus. (Visited Agoust 2013) Sony's smarttags could change phone habits. [Online]. Available: http://news.cnet.com/8301-17938\- 105-57359901-1/sonys-smarttags-could-change-phone-habits/
    • MacManus, C.1
  • 21
    • 84860889609 scopus 로고    scopus 로고
    • Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics
    • D. Kelly, R. Raines, R. Baldwin, M. Grimaila, and B. Mullins, "Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics," IEEE Commun. Surveys & Tutorials, vol. 14, no. 2, pp. 579-606, 2012.
    • (2012) IEEE Commun. Surveys & Tutorials , vol.14 , Issue.2 , pp. 579-606
    • Kelly, D.1    Raines, R.2    Baldwin, R.3    Grimaila, M.4    Mullins, B.5
  • 22
    • 84865434111 scopus 로고    scopus 로고
    • Future of wireless communication: Radioapps and related security and radio computer framework
    • M. Mueck, V Ivanov, S. Choi, J. Kim, C. Ahn, H. Yang, G. Baldini, and A. Piipponen, "Future of wireless communication: Radioapps and related security and radio computer framework," IEEE Wireless Commun., vol. 19, no. 4, pp. 9-16, 2012.
    • (2012) IEEE Wireless Commun. , vol.19 , Issue.4 , pp. 9-16
    • Mueck, M.1    Ivanov, V.2    Choi, S.3    Kim, J.4    Ahn, C.5    Yang, H.6    Baldini, G.7    Piipponen, A.8
  • 26
    • 84878309098 scopus 로고    scopus 로고
    • FM 99.9, radio virus: Exploiting FM radio broadcasts for malware deployment
    • Fernandes, Earlence and Crispo, Bruno and Conti, Mauro, "FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment," IEEE Trans. Inf. Forens. Security, 2013.
    • (2013) IEEE Trans. Inf. Forens. Security
    • Earlence, F.1    Bruno, C.2    Mauro, C.3
  • 27
    • 84861330060 scopus 로고    scopus 로고
    • Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead
    • G. Baldini, T. Sturman, A. Biswas, R. Leschhorn, G. Godor, and M. Street, "Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead," IEEE Commun. Surveys & Tutorials, vol. 14, no. 2, pp. 355-379, 2012.
    • (2012) IEEE Commun. Surveys & Tutorials , vol.14 , Issue.2 , pp. 355-379
    • Baldini, G.1    Sturman, T.2    Biswas, A.3    Leschhorn, R.4    Godor, G.5    Street, M.6
  • 31
    • 84883582229 scopus 로고    scopus 로고
    • Biometrics in new era of mobile access control
    • J. Fenske, "Biometrics in new era of mobile access control," Biometric Technology Today, vol. 2012, no. 9, pp. 9-11, 2012.
    • (2012) Biometric Technology Today , Issue.9 , pp. 9-11
    • Fenske, J.1
  • 35
    • 42549166924 scopus 로고    scopus 로고
    • Security aspects of mobile phone virus: A critical survey
    • DOI 10.1108/02635570810868344
    • D. Shih, B. Lin, H. Chiang, and M. Shih, "Security aspects of mobile phone virus: a critical survey," Industrial Management & Data Systems, vol. 108, no. 4, pp. 478-494, 2008. (Pubitemid 351590943)
    • (2008) Industrial Management and Data Systems , vol.108 , Issue.4 , pp. 478-494
    • Shih, D.-H.1    Lin, B.2    Chiang, H.-S.3    Shih, M.-H.4
  • 36
    • 84901187803 scopus 로고    scopus 로고
    • Juniper Juniper Networks Tech. Rep.
    • Juniper, "2013 mobile threats report," Juniper Networks, Tech. Rep., 2013.
    • (2013) 2013 Mobile Threats Report
  • 37
    • 84901232695 scopus 로고    scopus 로고
    • F-Secure F-Secure, Tech. Rep., April 2012, "http:// www.f-secure.com/ weblog/ archives /MobileThreatReport-Q12012.pdf
    • F-Secure, "Mobile threat report q1 2012," F-Secure, Tech. Rep., April 2012, "http://www.f-secure.com/weblog/archives/MobileThreatReport- Q12012.pdf".
    • Mobile Threat Report q1 2012
  • 38
    • 84901241345 scopus 로고    scopus 로고
    • McAfee McAfee, Tech. Rep., January
    • McAfee, "Threats report:fourth quarter 2012," McAfee, Tech. Rep., January 2013, http://www.mcafee.com/us/resources/reports/rp-quarterly- threat-q4-2012.pdf.
    • (2013) Threats Report:fourth Quarter 2012
  • 39
    • 58949099697 scopus 로고    scopus 로고
    • Dollars for downloading
    • M. Schipka, "Dollars for downloading," Network Security, vol. 2009, no. 1, pp. 7-11, 2009.
    • (2009) Network Security , Issue.1 , pp. 7-11
    • Schipka, M.1
  • 41
    • 84901190916 scopus 로고    scopus 로고
    • McAfee McAfee, Tech. Rep., January
    • McAfee, "Threats report:fourth quarter 2010," McAfee, Tech. Rep., January 2011, http://www.mcafee.com/us/resources/reports/rp-quarterly- threat-q4-2010.pdf.
    • (2011) Threats Report:fourth Quarter 2010
  • 42
    • 33749663423 scopus 로고    scopus 로고
    • RFID malware: Design principles and examples
    • DOI 10.1016/j.pmcj.2006.07.008, PII S157411920600040X
    • M. R. Rieback, P. N. Simpson, B. Crispo, and A. S. Tanenbaum, "Rfid malware: Design principles and examples," Pervasive and mobile computing, vol. 2, no. 4, pp. 405-426, 2006. (Pubitemid 44556556)
    • (2006) Pervasive and Mobile Computing , vol.2 , Issue.4 , pp. 405-426
    • Rieback, M.R.1    Simpson, P.N.D.2    Crispo, B.3    Tanenbaum, A.S.4
  • 45
    • 84970901426 scopus 로고    scopus 로고
    • Touchlogger: Inferring keystrokes on touch screen from smartphone motion
    • Berkeley, CA, USA
    • L. Cai and H. Chen, "Touchlogger: inferring keystrokes on touch screen from smartphone motion," in Proc. 6th USENIX conf. on Hot topics in security, ser. HotSec'11, Berkeley, CA, USA, 2011, pp. 9-9.
    • (2011) Proc. 6th USENIX Conf. on Hot Topics in Security, Ser. HotSec'11 , pp. 9-9
    • Cai, L.1    Chen, H.2
  • 47
    • 84901203964 scopus 로고    scopus 로고
    • AV-Test AV Test, Tech. Rep.
    • AV-Test, "Anti-malware solutions for android," AV Test, Tech. Rep., 2012, "http://www.av-test.org/fileadmin/pdf/avtest-2012-02-android- anti-malware-report-english.pdf".
    • (2012) Anti-malware Solutions for Android
  • 48
    • 84858392040 scopus 로고    scopus 로고
    • A survey on automated dynamic malware-analysis techniques and tools
    • Mar.
    • M. Egele, T. Scholte, E. Kirda, and C. Kruegel, "A survey on automated dynamic malware-analysis techniques and tools," ACM Comput. Surv., vol. 44, no. 2, pp. 6:1-6:42, Mar. 2012.
    • (2012) ACM Comput. Surv. , vol.44 , Issue.2 , pp. 61-642
    • Egele, M.1    Scholte, T.2    Kirda, E.3    Kruegel, C.4
  • 50
    • 81855220939 scopus 로고    scopus 로고
    • Defending users against smartphone apps: Techniques and future directions
    • Springer-Verlag
    • W. Enck, "Defending users against smartphone apps: techniques and future directions," in Proc. 7th int. conf. on Information Systems Security, ser. ICISS'11. Springer-Verlag, 2011, pp. 49-70.
    • (2011) Proc. 7th Int. Conf. on Information Systems Security, Ser. ICISS'11 , pp. 49-70
    • Enck, W.1
  • 53
    • 84901201606 scopus 로고    scopus 로고
    • (Visited January 2013) Android and security. [Online]. Available
    • H. Lockheimer. (Visited January 2013) Android and security. [Online]. Available: http://googlemobile.blogspot.com.es/2012/02/android-and-security.html
    • Lockheimer, H.1
  • 56
    • 84901241216 scopus 로고    scopus 로고
    • McAfee McAfee, Tech. Rep., January
    • McAfee, "Threats report:fourth quarter 2011," McAfee, Tech. Rep., January 2012, http://www.mcafee.com/us/resources/reports/rp-quarterly- threat-q4-2011.pdf.
    • (2012) Threats Report:fourth Quarter 2011
  • 61
    • 85037073388 scopus 로고    scopus 로고
    • Privilege escalation attacks on android
    • M. Burmester, G. Tsudik, S. Magliveras, and I. Ilic, Eds. Springer Berlin/Heidelberg
    • L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy, "Privilege escalation attacks on android," in Information Security, ser. Lecture Notes in Computer Science, M. Burmester, G. Tsudik, S. Magliveras, and I. Ilic, Eds. Springer Berlin/Heidelberg, 2011, vol. 6531, pp. 346-360.
    • (2011) Information Security, Ser. Lecture Notes in Computer Science , vol.6531 , pp. 346-360
    • Davi, L.1    Dmitrienko, A.2    Sadeghi, A.-R.3    Winandy, M.4
  • 69
    • 84870151992 scopus 로고    scopus 로고
    • Crepe: Context-related policy enforcement for android
    • M. Conti, V. Nguyen, and B. Crispo, "Crepe: Context-related policy enforcement for android," Information Security, pp. 331-345, 2011.
    • (2011) Information Security , pp. 331-345
    • Conti, M.1    Nguyen, V.2    Crispo, B.3
  • 74
    • 77950673302 scopus 로고    scopus 로고
    • Securing android-powered mobile devices using selinux
    • A. Shabtai, Y. Fledel, and Y. Elovici, "Securing android-powered mobile devices using selinux," IEEE Security & Privacy, vol. 8, no. 3, pp. 36-44, 2010.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.3 , pp. 36-44
    • Shabtai, A.1    Fledel, Y.2    Elovici, Y.3
  • 75
    • 77954740912 scopus 로고    scopus 로고
    • Beyond kernel-level integrity measurement: Enabling remote attestation for the android platform
    • Springer
    • M. Nauman, S. Khan, X. Zhang, and J.-P. Seifert, "Beyond kernel-level integrity measurement: enabling remote attestation for the android platform," in Trust and Trustworthy Computing. Springer, 2010, pp. 1-15.
    • (2010) Trust and Trustworthy Computing , pp. 1-15
    • Nauman, M.1    Khan, S.2    Zhang, X.3    Seifert, J.-P.4
  • 78
    • 33750513188 scopus 로고    scopus 로고
    • Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
    • DOI 10.1016/j.apergo.2006.03.010, PII S000368700600041X
    • S. Kraemer and P. Carayon, "Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists," Applied Ergonomics, vol. 38, no. 2, pp. 143-154, 2007. (Pubitemid 44666662)
    • (2007) Applied Ergonomics , vol.38 , Issue.2 , pp. 143-154
    • Kraemer, S.1    Carayon, P.2
  • 89
    • 84901201598 scopus 로고    scopus 로고
    • Apple. (May 2012) ios security. [Online]
    • Apple. (May 2012) ios security. [Online]. Available: http://images. apple.com/ipad/business/docs/iOS-Security-May12.pdf
  • 90
    • 84901201599 scopus 로고    scopus 로고
    • (Visited May 2013) Data privacy of ios 6 release notes. [Online]. Available
    • D. Chubb. (Visited May 2013) Data privacy of ios 6 release notes. [Online]. Available: http://www.product-reviews.net/2012/06/15/ios-6-release- notes-show-heightened-security/
    • Chubb, D.1
  • 91
    • 84901201589 scopus 로고    scopus 로고
    • (Visited May 2013) Comparision of ios and android security. [Online]. Available
    • C. Miller. (Visited May 2013) Comparision of ios and android security. [Online]. Available: http://www.accuvant.com/blog/2011/10/20/dr-charlie-miller- compares-security-ios-and-android
    • Miller, C.1
  • 92
    • 84901201590 scopus 로고    scopus 로고
    • Apple. (Visited May 2013) Apple answers fcc questions. [Online]
    • Apple. (Visited May 2013) Apple answers fcc questions. [Online]. Available: http://www.apple.com/hotnews/apple-ans wers-fcc-questions/
  • 93
    • 84926651513 scopus 로고    scopus 로고
    • Mcrosoft Microsoft Coor-poration, Tech. Rep., December
    • Mcrosoft, "Windows Phone 8 Security Overview," Microsoft Coor-poration, Tech. Rep., December 2012, http://go.microsoft.com/fwlink/? LinkId=266838.
    • (2012) Windows Phone 8 Security Overview
  • 96
    • 84901201591 scopus 로고    scopus 로고
    • (Visited May 2013) Samsung devices with support for remote controllers. [Online]. Available
    • L. Auriemma. (Visited May 2013) Samsung devices with support for remote controllers. [Online]. Available: http://aluigi.org/adv/samsux- 1-adv.txt
    • Auriemma, L.1
  • 97
    • 84901201592 scopus 로고    scopus 로고
    • Sophos. (Visited May 2013) First anti-virus software for connected tv. [Online]
    • Sophos. (Visited May 2013) First anti-virus software for connected tv. [Online]. Available: http://goo.gl/Ww67D
  • 100
    • 84901188021 scopus 로고    scopus 로고
    • S. Corporation Visited May 2013
    • S. Corporation, "Symantec security threats," Visited May 2013, http://www.symantec.com/security-response/landing/threats.jsp.
    • Symantec Security Threats
  • 101
    • 84901200687 scopus 로고    scopus 로고
    • F-Secure Visited May 2013
    • F-Secure, "F-secure mobile threats," Visited May 2013, http://www.f-secure.com/en/web/labs-global/mobile-security.
    • F-secure Mobile Threats
  • 102
    • 84901201593 scopus 로고    scopus 로고
    • Lookout. (Visited May 2013) Notcompatible. [Online]
    • Lookout. (Visited May 2013) Notcompatible. [Online]. Available: http://goo.gl/yJEgn
  • 108
    • 84901201594 scopus 로고    scopus 로고
    • S. Ldt Visited May 2013
    • S. Ldt, "Sophos endpoint protection," Visited May 2013, http://www.sophos.com.
    • Sophos Endpoint Protection
  • 111
    • 84901241538 scopus 로고    scopus 로고
    • NakedSecurity Visited May 2013
    • NakedSecurity, "Malicious cloned games attack google android market," Visited May 2013, http://nakedsecurity.sophos.com/2011/12/12/ malicious-cloned-games-attack-google-android-market/.
    • Malicious Cloned Games Attack Google Android Market
  • 113
    • 84901201582 scopus 로고    scopus 로고
    • Skycure. (Visited May 2013) Malicious Profiles-The Sleeping Giant of iOS Security. [Online]. Available: \textcolor{black}{
    • Skycure. (Visited May 2013) Malicious Profiles-The Sleeping Giant of iOS Security. [Online]. Available: \textcolor{black}{http://blog. skycure.com/2013/03/malicious-profiles-sleeping-giant-of.html}
  • 114
  • 118
    • 84901201585 scopus 로고    scopus 로고
    • Dendroid: A text mining approach to analyzing and classifying code structures in android malware families
    • in Press
    • G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and J. B. Alis, "Dendroid: A text mining approach to analyzing and classifying code structures in android malware families," Expert Systems with Applications, 2013, in Press.
    • (2013) Expert Systems with Applications
    • Suarez-Tangil, G.1    Tapiador, J.E.2    Peris-Lopez, P.3    Alis, J.B.4
  • 122
  • 130
    • 85060493868 scopus 로고    scopus 로고
    • Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
    • L. Yan and H. Yin, "Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis," in Proc. 21st USENIX conf. on Security symp. USENIX Association, 2012, pp. 29-29.
    • (2012) Proc. 21st USENIX Conf. on Security Symp. USENIX Association , pp. 29-29
    • Yan, L.1    Yin, H.2
  • 147
    • 84865590234 scopus 로고    scopus 로고
    • Attack of the clones: Detecting cloned applications on android markets
    • J. Crussell, C. Gibler, and H. Chen, "Attack of the clones: Detecting cloned applications on android markets," Computer Security-ESORICS 2012, pp. 37-54, 2012.
    • (2012) Computer Security-ESORICS 2012 , pp. 37-54
    • Crussell, J.1    Gibler, C.2    Chen, H.3
  • 151
    • 78650032454 scopus 로고    scopus 로고
    • Return-oriented programming without returns
    • A. Keromytis and V. Shmatikov, Eds. ACM Press, Oct.
    • S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy, "Return-oriented programming without returns," in Proc. of CCS 2010, A. Keromytis and V. Shmatikov, Eds. ACM Press, Oct. 2010, pp. 559-72.
    • (2010) Proc. of CCS 2010 , pp. 559-572
    • Checkoway, S.1    Davi, L.2    Dmitrienko, A.3    Sadeghi, A.-R.4    Shacham, H.5    Winandy, M.6
  • 155
    • 0034508863 scopus 로고    scopus 로고
    • Collaborative reputation mechanisms for electronic marketplaces
    • DOI 10.1016/S0167-9236(00)00084-1
    • G. Zacharia, A. Moukas, and P. Maes, "Collaborative reputation mechanisms for electronic marketplaces," Decision Support Systems, vol. 29, no. 4, pp. 371-388, 2000. (Pubitemid 32034316)
    • (2000) Decision Support Systems , vol.29 , Issue.4 , pp. 371-388
    • Zacharia, G.1    Moukas, A.2    Maes, P.3
  • 156
    • 84864579042 scopus 로고    scopus 로고
    • A survey of trust in workflows and relevant contexts
    • W. Viriyasitavat and A. Martin, "A survey of trust in workflows and relevant contexts," IEEE Commun. Surveys & Tutorials, vol. 14, no. 3, pp. 911-940, 2012.
    • (2012) IEEE Commun. Surveys & Tutorials , vol.14 , Issue.3 , pp. 911-940
    • Viriyasitavat, W.1    Martin, A.2
  • 157
    • 84861334371 scopus 로고    scopus 로고
    • Trust computations and trust dynamics in mobile adhoc networks: A survey
    • K. Govindan and P. Mohapatra, "Trust computations and trust dynamics in mobile adhoc networks: A survey," IEEE Commun. Surveys & Tutorials, vol. 14, no. 2, pp. 279-298, 2012.
    • (2012) IEEE Commun. Surveys & Tutorials , vol.14 , Issue.2 , pp. 279-298
    • Govindan, K.1    Mohapatra, P.2
  • 163
    • 84901201588 scopus 로고    scopus 로고
    • WhatsApp. (Visited March 2013) Legal info. [Online]. Available
    • WhatsApp. (Visited March 2013) Legal info. [Online]. Available: http://www.whatsapp.com/legal/?l=en-en
  • 164
    • 84901201579 scopus 로고    scopus 로고
    • Google. (Visited May 2013) Google app engine. [Online]. Available
    • Google. (Visited May 2013) Google app engine. [Online]. Available: www.google.com/enterprise/cloud/appengine
  • 165
    • 77955344280 scopus 로고    scopus 로고
    • Android anti-forensics through a local paradigm
    • A. Distefano, G. Me, and F. Pace, "Android anti-forensics through a local paradigm," Digital Investigation, vol. 7, Supplement, pp. S83-S94, 2010.
    • (2010) Digital Investigation , vol.7 , Issue.SUPPL.
    • Distefano, A.1    Me, G.2    Pace, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.