Exposing Security Risks for Commercial Mobile Devices
暂无分享,去创建一个
[1] Angelos Stavrou,et al. Exploiting smart-phone USB connectivity for fun and profit , 2010, ACSAC '10.
[2] Angelos Stavrou,et al. Implementing and Optimizing an Encryption Filesystem on Android , 2012, 2012 IEEE 13th International Conference on Mobile Data Management.
[3] Kang G. Shin,et al. Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.
[4] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[5] Hao Chen,et al. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery , 2006, 2006 Securecomm and Workshops.
[6] Arati Baliga,et al. Rootkits on smart phones: attacks, implications and opportunities , 2010, HotMobile '10.
[7] Wei Liu,et al. PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[8] Mihir Bellare,et al. Optimal Asymmetric Encryption-How to Encrypt with RSA , 1995 .
[9] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[10] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[11] James Noble,et al. Reflections on remote reflection , 2001, Proceedings 24th Australian Computer Science Conference. ACSC 2001.
[12] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[13] Tzi-cker Chiueh,et al. A Forced Sampled Execution Approach to Kernel Rootkit Identification , 2007, RAID.
[14] Angelos Stavrou,et al. Attestation & Authentication for USB Communications , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability Companion.
[15] Roy H. Campbell,et al. Cloaker: Hardware Supported Rootkit Concealment , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[16] Jonathon T. Giffin,et al. Impeding Malware Analysis Using Conditional Code Obfuscation , 2008, NDSS.
[17] Gary McGraw,et al. Static Analysis for Security , 2004, IEEE Secur. Priv..
[18] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[19] Sahin Albayrak,et al. An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[20] Trent Jaeger,et al. Measuring integrity on mobile phone systems , 2008, SACMAT '08.
[21] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[22] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[23] Zhenkai Liang,et al. Automatically Identifying Trigger-based Behavior in Malware , 2008, Botnet Detection.
[24] Mihir Bellare,et al. Optimal Asymmetric Encryption , 1994, EUROCRYPT.
[25] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[26] Dan Boneh,et al. Address space randomization for mobile devices , 2011, WiSec '11.
[27] Patrick D. McDaniel,et al. Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.
[28] Michael S. Hsiao,et al. Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[29] Lei Liu,et al. VirusMeter: Preventing Your Cellphone from Spies , 2009, RAID.
[30] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[31] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[32] Joseph G. Tront,et al. Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices , 2010, 2010 43rd Hawaii International Conference on System Sciences.