The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers
暂无分享,去创建一个
Wenke Lee | Patrick Traynor | Manos Antonakakis | Bradley Reaves | Charles Lever | Wenke Lee | Patrick Traynor | Bradley Reaves | M. Antonakakis | Chaz Lever
[1] Paul V. Mockapetris,et al. Domain names - implementation and specification , 1987, RFC.
[2] Paul V. Mockapetris,et al. Domain names - concepts and facilities , 1987, RFC.
[3] Paul Albitz,et al. DNS and BIND , 1994 .
[4] Robert Tappan Morris,et al. DNS performance and the effectiveness of caching , 2001, IMW '01.
[5] Duane Wessels,et al. Measurements and Laboratory Simulations of the Upper DNS Hierarchy , 2004, PAM.
[6] Fabio Ricciato,et al. Unwanted traffic in 3G networks , 2006, CCRV.
[7] Paul Albitz,et al. DNS and BIND (5th Edition) , 2006 .
[8] Patrick D. McDaniel,et al. On Attack Causality in Internet-Connected Cellular Networks , 2007, USENIX Security Symposium.
[9] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[10] Wenke Lee,et al. Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries , 2008, CCS.
[11] Thomas F. La Porta,et al. Exploiting open functionality in SMS-capable cellular networks , 2008, J. Comput. Secur..
[12] Thomas F. La Porta,et al. On cellular botnets: measuring the impact of malicious devices on a cellular network core , 2009, CCS.
[13] Lawrence K. Saul,et al. Beyond blacklists: learning to detect malicious web sites from suspicious URLs , 2009, KDD.
[14] Patrick D. McDaniel,et al. Understanding Android Security , 2009, IEEE Security & Privacy Magazine.
[15] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[16] Thomas F. La Porta,et al. Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks , 2006, IEEE/ACM Transactions on Networking.
[17] N. Feamster,et al. An Internet-Wide View into DNS Lookup Patterns , 2010 .
[18] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[19] Deborah Estrin,et al. A first look at traffic on smartphones , 2010, IMC '10.
[20] Nick Feamster,et al. Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.
[21] Wenke Lee,et al. Detecting Malware Domains at the Upper DNS Hierarchy , 2011, USENIX Security Symposium.
[22] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[23] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[24] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[25] Thomas F. La Porta,et al. From mobile phones to responsible devices , 2011, Secur. Commun. Networks.
[26] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[27] Leyla Bilge,et al. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis , 2011, NDSS.
[28] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[29] David A. Wagner,et al. The Effectiveness of Application Permissions , 2011, WebApps.
[30] K. K. Ramakrishnan,et al. Over the top video: the gorilla in cellular networks , 2011, IMC '11.
[31] Aditya Akella,et al. A Comparative Study of Handheld and Non-handheld Traffic in Campus Wi-Fi Networks , 2011, PAM.
[32] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[33] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.