메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Mobile Malware Attacks and Defense

(1)  Dunham, Ken a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85011002982     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-1-59749-298-0.X0001-8     Document Type: Book
Times cited : (25)

References (9)
  • 1
    • 84882215469 scopus 로고    scopus 로고
    • FBI uses cellphones to eavesdrop on suspects - even when they're off
    • URL:, [Accessed: June 7th, 2008]
    • Coughlin K FBI uses cellphones to eavesdrop on suspects - even when they're off. The Seattle Times 2006, URL:, [Accessed: June 7th, 2008]. http://www.policeone.com/police-products/radios/surveillance-accessories/articles/1197457/.
    • (2006) The Seattle Times
    • Coughlin, K.1
  • 3
    • 84882133670 scopus 로고    scopus 로고
    • Harrington Signal Isolation
    • URL:, (requires registration) [Accessed: June 7th, 2008]
    • Harrington Signal Isolation 2007, URL:, (requires registration) [Accessed: June 7th, 2008]. http://www.mobile-examiner.com/vb/showthread.php?p=39.
    • (2007)
  • 4
    • 84882233101 scopus 로고    scopus 로고
    • [Accessed: July 17th, 2008]
    • Naccache D. Forensics and mobile communications 2007, [Accessed: July 17th, 2008]. http://www.lsec.be/upload_directories/documents/3ForensicsandMobileCommunications_DavidNaccache.pdf.
    • (2007) Forensics and mobile communications
    • Naccache, D.1
  • 5
    • 48749111433 scopus 로고    scopus 로고
    • Guidelines on Cell Phone Forensics. Special Publication 800-101
    • NIST, National Institute for Standards and Technology, USA
    • Guidelines on Cell Phone Forensics. Special Publication 800-101 2007, NIST, National Institute for Standards and Technology, USA.
    • (2007)
  • 6
    • 77952255373 scopus 로고    scopus 로고
    • COSEINC Advanced Malware Labs, Singapore, URL:, [Accessed: July 17th, 2008]
    • Rutkowska Joanna Beyond the CPU: Defeating Hardware-Based RAM Acquisition 2007, COSEINC Advanced Malware Labs, Singapore, URL:, [Accessed: July 17th, 2008]. http://www.i.i.com.com/cnwk.1d/i/z/200701/bh-dc-07-Rutkowska-ppt.pdf.
    • (2007) Beyond the CPU: Defeating Hardware-Based RAM Acquisition
    • Rutkowska, J.1
  • 7
    • 84882193593 scopus 로고    scopus 로고
    • Symantec SymbOS.Commwarrior.A. Symantec security response
    • Symantec, USA, CA, URL:, [Accessed: July 17th, 2008]
    • Symantec SymbOS.Commwarrior.A. Symantec security response 2005, Symantec, USA, CA, URL:, [Accessed: July 17th, 2008]. http://www.symantec.com/security_response/writeup.jsp?docid=2005-030721-2716-99&tabid=2.
    • (2005)
  • 8
    • 84882204105 scopus 로고    scopus 로고
    • Trend-Micro Vulnerability in Internet Explorer for Windows Mobile
    • Trend-Micro, Cupertino, CA, Security Advisories. URL:, [Accessed: June 7th, 2008]
    • Trend-Micro Vulnerability in Internet Explorer for Windows Mobile 2007, Trend-Micro, Cupertino, CA, Security Advisories. URL:, [Accessed: June 7th, 2008]. http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+Internet+Explorer+for+Windows+Mobile.
    • (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.