-
1
-
-
84923201020
-
Defending against sensor-sniffing attacks on mobile phones
-
Cai, L., Machiraju, S., Chen, H.: Defending against sensor-sniffing attacks on mobile phones. In: Proceedings of the 1st ACM Workshop on Networking, systems, and Applications for Mobile Handhelds - MobiHeld 2009, p. 31 (2009), http://portal.acm.org/citation.cfm?doid=1592606.1592614
-
(2009)
Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds - MobiHeld 2009
, pp. 31
-
-
Cai, L.1
Machiraju, S.2
Chen, H.3
-
2
-
-
74049155830
-
On lightweight mobile phone application certification
-
ACM, New York
-
Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 235-245. ACM, New York (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
3
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
ACM, New York
-
Sadeghi, A.-R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: Proceedings of the 2004 Workshop on New Security Paradigms, NSPW 2004, pp. 67-77. ACM, New York (2004)
-
(2004)
Proceedings of the 2004 Workshop on New Security Paradigms, NSPW 2004
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
4
-
-
84857164924
-
Soundminer: A Stealthy and Context-Aware Sound Trojan for Smartphones
-
Febraury
-
Schlegel, R., Zhang, K., Zhou, X., Intwala,M., Kapadia, A.,Wang, X.: Soundminer: A Stealthy and Context-Aware Sound Trojan for Smartphones. In: Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS), pp. 17-33 (Febraury 2011)
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS)
, pp. 17-33
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
5
-
-
54249112442
-
A software-based trusted platform module emulator
-
Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. Springer, Heidelberg
-
Strasser, M., Stamer, H.: A software-based trusted platform module emulator. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 33-47. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4968
, pp. 33-47
-
-
Strasser, M.1
Stamer, H.2
-
6
-
-
70450250883
-
-
Version 1.0 Revision 7.02 April
-
TCG Mobile Phone Work Group: Mobile Trusted Module Specification, Version 1.0 Revision 7.02 (April 2010), http://www.trustedcomputinggroup.org/resources/ mobile-phone-work-group-mobile-trusted-module-specification
-
(2010)
Mobile Trusted Module Specification
-
-
-
7
-
-
79959434503
-
-
January (accessed on February 27, 2011)
-
The H Security: Android app steals bank login details (January 2010), http://www.h-online.com/security/news/item/Android-app-steals-banklogin-details- 901895.html(accessed on February 27, 2011)
-
(2010)
Android App Steals Bank Login Details
-
-
-
8
-
-
79959411981
-
-
August (accessed on February 27, 2011)
-
The H Security: First SMS trojan for Android detected (August 2010), http://www.h-online.com/security/news/item/First-SMS-trojan-for -Android-detected-1053466.html(accessed on February 27, 2011)
-
(2010)
First SMS Trojan for Android Detected
-
-
-
10
-
-
70349263625
-
Stealthy video capturer: A new video-based spyware in 3g smartphones
-
ACM, New York
-
Xu, N., Zhang, F., Luo, Y., Jia, W., Xuan, D., Teng, J.: Stealthy video capturer: a new video-based spyware in 3g smartphones. In: Proceedings of the Second ACM Conference on Wireless Network Security, WiSec 2009, pp. 69-78. ACM, New York (2009)
-
(2009)
Proceedings of the Second ACM Conference on Wireless Network Security, WiSec 2009
, pp. 69-78
-
-
Xu, N.1
Zhang, F.2
Luo, Y.3
Jia, W.4
Xuan, D.5
Teng, J.6
|