-
1
-
-
84869797921
-
Understanding and improving app installation security mechanisms through empirical analysis of android
-
ACM
-
D. Barrera, J. Clark, D. McCarney, and P. C. van Oorschot. Understanding and improving app installation security mechanisms through empirical analysis of android. In Proc. the second ACM workshop on Security and privacy in smartphones and mobile devices, SPSM'12, pages 81-92. ACM, 2012.
-
(2012)
Proc. the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM'12
, pp. 81-92
-
-
Barrera, D.1
Clark, J.2
McCarney, D.3
Van Oorschot, P.C.4
-
3
-
-
84866674166
-
Detection of mobile malware in the wild
-
M. Chandramohan and H. B. K. Tan. Detection of mobile malware in the wild. Computer, 45(9):65-71, 2012.
-
(2012)
Computer
, vol.45
, Issue.9
, pp. 65-71
-
-
Chandramohan, M.1
Tan, H.B.K.2
-
4
-
-
84861302816
-
Is this app safe?: A large scale study on application permissions and risk signals
-
ACM
-
P. H. Chia, Y. Yamamoto, and N. Asokan. Is this app safe?: a large scale study on application permissions and risk signals. In Proc. the 21st international conference on World Wide Web, WWW '12, pages 311-320. ACM, 2012.
-
(2012)
Proc. the 21st International Conference on World Wide Web, WWW '12
, pp. 311-320
-
-
Chia, P.H.1
Yamamoto, Y.2
Asokan, N.3
-
6
-
-
80755181021
-
A survey of mobile malware in the wild
-
ACM
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A survey of mobile malware in the wild. In Proc. the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM'11, pages 3-14. ACM, 2011.
-
(2011)
Proc. the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM'11
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
7
-
-
84909638072
-
Mobile malware detection based on energy fingerprints - A dead end?
-
J. Hoffmann, S. Neumann, and T. Holz. Mobile malware detection based on energy fingerprints - a dead end? In RAID, 2013.
-
(2013)
RAID
-
-
Hoffmann, J.1
Neumann, S.2
Holz, T.3
-
8
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
ACM
-
H. Kim, J. Smith, and K. G. Shin. Detecting energy-greedy anomalies and mobile malware variants. In Proc. the 6th international conference on Mobile systems, applications, and services, MobiSys '08, pages 239-252. ACM, 2008.
-
(2008)
Proc. the 6th International Conference on Mobile Systems, Applications, and Services, MobiSys '08
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
9
-
-
79952846708
-
Old, new, borrowed, blue: A perspective on the evolution of mobile platform security architectures
-
ACM
-
K. Kostiainen, E. Reshetova, J.-E. Ekberg, and N. Asokan. Old, new, borrowed, blue: a perspective on the evolution of mobile platform security architectures. In First ACM Conference on Data and Application Security and Privacy, pages 13-24. ACM, 2011.
-
First ACM Conference on Data and Application Security and Privacy
, vol.2011
, pp. 13-24
-
-
Kostiainen, K.1
Reshetova, E.2
Ekberg, J.-E.3
Asokan, N.4
-
11
-
-
84951915648
-
The core of the matter: Analyzing malicious traffic in cellular carriers
-
Internet Society
-
C. Lever, M. Antonakakis, B. Reeves, P. Traynor, and W. Lee. The core of the matter: Analyzing malicious traffic in cellular carriers. In Proc. the 2013 Network and Distributed Systems Security Conference (NDSS 2013). Internet Society, 2013.
-
(2013)
Proc. the 2013 Network and Distributed Systems Security Conference (NDSS 2013)
-
-
Lever, C.1
Antonakakis, M.2
Reeves, B.3
Traynor, P.4
Lee, W.5
-
13
-
-
84909638070
-
Lookout tours the current world of mobile threats
-
June
-
Lookout Mobile. Lookout tours the current world of mobile threats. Lookout blog, June 2013. https://blog.lookout.com/blog/2013/06/05/world-current-of-mobile-threats/.
-
(2013)
Lookout Blog
-
-
Lookout Mobile1
-
14
-
-
84909638069
-
Threat of the week: Mobile malware, menace or myth?
-
Apr.
-
R. McGarvey. Threat of the week: Mobile malware, menace or myth? CreditUnion Times, Apr. 2013.
-
(2013)
CreditUnion Times
-
-
McGarvey, R.1
-
15
-
-
84909638068
-
Mobile malware up 163% in 2012, getting even smarter in 2013
-
NQMobile. Mobile malware up 163% in 2012, getting even smarter in 2013. PRNEwsWire, 2013. http://ir.nq.com/phoenix.zhtml?c=243152&p=irol-newsArticle&id=1806588.
-
(2013)
PRNEwsWire
-
-
NQMobile1
-
16
-
-
84905676511
-
Carat: Collaborative energy diagnosis for mobile devices
-
Nov
-
A. J. Oliner, A. P. Iyer, I. Stoica, E. Lagerspetz, and S. Tarkoma. Carat: Collaborative energy diagnosis for mobile devices. In Proc. 11th ACM Conference on Embedded Networked Sensor Systems, Nov 2013.
-
(2013)
Proc. 11th ACM Conference on Embedded Networked Sensor Systems
-
-
Oliner, A.J.1
Iyer, A.P.2
Stoica, I.3
Lagerspetz, E.4
Tarkoma, S.5
-
17
-
-
84909638066
-
-
Mar.
-
L. Page. Update from the CEO, Mar. 2013. http://googleblog.blogspot.fi/2013/03/update-from-ceo.html.
-
(2013)
Update from the CEO
-
-
Page, L.1
-
18
-
-
84864366834
-
What is keeping my phone awake? Characterizing and detecting no-sleep energy bugs in smartphone apps
-
A. Pathak, A. Jindal, Y. C. Hu, and S. Midkiff. What is keeping my phone awake? Characterizing and detecting no-sleep energy bugs in smartphone apps. In Mobisys, 2012.
-
(2012)
Mobisys
-
-
Pathak, A.1
Jindal, A.2
Hu, Y.C.3
Midkiff, S.4
-
20
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: a system for detecting network intruders in real-time. In Computer Networks, volume 31, 1999.
-
(1999)
Computer Networks
, vol.31
-
-
Paxson, V.1
-
21
-
-
78751498804
-
Paranoid android: Versatile protection for smartphones
-
New York, NY, USA, ACM
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid android: versatile protection for smartphones. In Proc. the 26th Annual Computer Security Applications Conference, ACSAC '10, pages 347-356, New York, NY, USA, 2010. ACM.
-
(2010)
Proc. the 26th Annual Computer Security Applications Conference, ACSAC '10
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
23
-
-
84939128749
-
MobileSandbox: Looking deeper into android applications
-
M. Spreitzenbarth, F. Echtler, T. Schrek, F. C. Freiling, and J. Hoffman. MobileSandbox: looking deeper into android applications. In Proc. the 28th ACM Symposium on Applied Computing (SAC), 2013.
-
(2013)
Proc. the 28th ACM Symposium on Applied Computing (SAC)
-
-
Spreitzenbarth, M.1
Echtler, F.2
Schrek, T.3
Freiling, F.C.4
Hoffman, J.5
-
26
-
-
84909638061
-
The company you keep: Mobile malware infection rates and inexpensive risk indicators
-
abs/1312.3245
-
H. T. T. Truong, E. Lagerspetz, P. Nurmi, A. J. Oliner, S. Tarkoma, N. Asokan, and S. Bhattacharya. The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators. CoRR, abs/1312.3245, 2013. http://arxiv.org/abs/1312.3245.
-
(2013)
CoRR
-
-
Truong, H.T.T.1
Lagerspetz, E.2
Nurmi, P.3
Oliner, A.J.4
Tarkoma, S.5
Asokan, N.6
Bhattacharya, S.7
-
28
-
-
84862954570
-
Enhancing mobile malware detection with social collaboration
-
L. Yang, V. Ganapathy, and L. Iftode. Enhancing mobile malware detection with social collaboration. In Privacy, Security, Risk and Trust (PASSAT), IEEE Third International Conference on Social Computing (SocialCom), pages 572-576, 2011.
-
(2011)
Privacy, Security, Risk and Trust (PASSAT), IEEE Third International Conference on Social Computing (SocialCom)
, pp. 572-576
-
-
Yang, L.1
Ganapathy, V.2
Iftode, L.3
-
30
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Feb.
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In Proc. the 2012 Network and Distributed Systems Security Conference (NDSS 2012), Feb. 2012.
-
(2012)
Proc. the 2012 Network and Distributed Systems Security Conference (NDSS 2012)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|