Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware
暂无分享,去创建一个
Yan Zhu | Di Ma | Nitesh Saxena | Babins Shrestha | Haoyu Li
[1] Michel Beaudouin-Lafon,et al. Charade: remote control of objects using free-hand gestures , 1993, CACM.
[2] Christopher Krügel,et al. Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications , 2014, NDSS.
[3] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[4] Ka-Ping Yee,et al. Aligning Security and Usability , 2004, IEEE Secur. Priv..
[5] Zhi Xu,et al. A Specification Based Intrusion Detection Framework for Mobile Phones , 2011, ACNS.
[6] Lei Yang,et al. Accurate online power estimation and automatic battery behavior based power model generation for smartphones , 2010, 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[7] Collin Mulliner,et al. Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones , 2009, 2009 International Conference on Availability, Reliability and Security.
[8] David J. Crandall,et al. PlaceRaider: Virtual Theft in Physical Spaces with Smartphones , 2012, NDSS.
[9] Kirsi Helkala,et al. Biometric Gait Authentication Using Accelerometer Sensor , 2006, J. Comput..
[10] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[11] Tadayoshi Kohno,et al. RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications , 2008, CCS.
[12] Songwu Lu,et al. SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.
[13] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[14] Elisa Bertino,et al. Context-Based Access Control Systems for Mobile Devices , 2015, IEEE Transactions on Dependable and Secure Computing.
[15] Di Ma,et al. Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.
[16] Kirstie Hawkey,et al. Do windows users follow the principle of least privilege?: investigating user account control practices , 2010, SOUPS.
[17] Hari Balakrishnan,et al. Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks , 2009, NSDI.
[18] Sahin Albayrak,et al. Static Analysis of Executables for Collaborative Malware Detection on Android , 2009, 2009 IEEE International Conference on Communications.
[19] Yuval Elovici,et al. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey , 2009, Inf. Secur. Tech. Rep..
[20] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[21] Jean-Pierre Seifert,et al. pBMDS: a behavior-based malware detection system for cellphone devices , 2010, WiSec '10.
[22] Mauro Conti,et al. Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call , 2011, ASIACCS '11.
[23] Gabi Nakibly,et al. Gyrophone: Recognizing Speech from Gyroscope Signals , 2014, USENIX Security Symposium.
[24] Deepak Venugopal,et al. An efficient signature representation and matching method for mobile devices , 2006, WICON '06.
[25] Yan Zhu,et al. Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures , 2013, WiSec '13.
[26] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[27] Nicoleta Roman,et al. Intelligent virus detection on mobile devices , 2006, PST.
[28] Xiang Cao,et al. VisionWand: interaction techniques for large displays using a passive wand tracked in 3D , 2003, UIST '03.
[29] Kang G. Shin,et al. Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.
[30] Christian Bauckhage,et al. Malware Detection on Mobile Devices Using Distributed Machine Learning , 2010, 2010 20th International Conference on Pattern Recognition.
[31] Helen J. Wang,et al. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[32] Patrick Traynor,et al. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.
[33] Zhen Wang,et al. uWave: Accelerometer-based Personalized Gesture Recognition and Its Applications , 2009, PerCom.
[34] Jun Han,et al. ACComplice: Location inference using accelerometers on smartphones , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).