A Review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices
暂无分享,去创建一个
[1] Grant A. Jacoby,et al. Battery-based intrusion detection , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[2] Alessio Merlo,et al. Towards energy-aware intrusion detection systems on mobile devices , 2013, 2013 International Conference on High Performance Computing & Simulation (HPCS).
[3] Abdelwahab Hamou-Lhadj,et al. On-device anomaly detection for resource-limited systems , 2015, SAC.
[4] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[5] Mansour Ahmadi,et al. Malware detection by behavioural sequential patterns , 2013 .
[6] Grant A. Jacoby,et al. Battery-Based Intrusion Detection: A Focus on Power for Security Assurance , 2004 .
[7] Eemil Lagerspetz,et al. The company you keep: mobile malware infection rates and inexpensive risk indicators , 2013, WWW.
[8] Paramvir Bahl,et al. Fine-grained power modeling for smartphones using system call tracing , 2011, EuroSys '11.
[9] Ming Zhang,et al. Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof , 2012, EuroSys '12.
[10] Thomas Zefferer,et al. Power Consumption-based Application Classification and Malware Detection on Android Using Machine-Learning Techniques , 2013 .
[11] Ding Li,et al. An Empirical Study of the Energy Consumption of Android Applications , 2014, 2014 IEEE International Conference on Software Maintenance and Evolution.
[12] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[13] Tom Martin,et al. Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.
[14] Christian Bonnet,et al. Usage patterns based security attacks for smart devices , 2014, 2014 IEEE Fourth International Conference on Consumer Electronics Berlin (ICCE-Berlin).
[15] Wojciech Mazurczyk,et al. Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence , 2016, IEEE Transactions on Information Forensics and Security.
[16] Jácome Cunha,et al. Detecting Anomalous Energy Consumption in Android Applications , 2014, SBLP.
[17] Khalid Mohamed Abdelrahman y Alzarooni,et al. Malware variant detection , 2012 .
[18] Gernot Heiser,et al. An Analysis of Power Consumption in a Smartphone , 2010, USENIX Annual Technical Conference.
[19] Alessandra Gorla,et al. Checking app behavior against app descriptions , 2014, ICSE.
[20] Aditya P. Mathur,et al. A Survey of Malware Detection Techniques , 2007 .
[21] Kang G. Shin,et al. Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.
[22] Sakir Sezer,et al. Dynalog: an automated dynamic analysis framework for characterizing android applications , 2016, 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security).
[23] Thorsten Holz,et al. Mobile Malware Detection Based on Energy Fingerprints - A Dead End? , 2013, RAID.
[24] Shivakant Mishra,et al. Location based power analysis to detect malicious code in smartphones , 2011, SPSM '11.
[25] Matthew Shears,et al. Internet Society global Internet report 2017: paths to our digital future , 2017 .
[26] Ramesh Govindan,et al. Estimating mobile application energy consumption using program analysis , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[27] Matti Siekkinen,et al. Smartphone Energy Consumption: Modeling and Optimization , 2014 .
[28] Xiao Ma,et al. eDoctor : Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones , 2013 .
[29] Alfredo De Santis,et al. Multimedia-based battery drain attacks for Android devices , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).
[30] Lei Liu,et al. VirusMeter: Preventing Your Cellphone from Spies , 2009, RAID.
[31] Heng Yin,et al. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.
[32] Azzam Mourad,et al. Towards Smart Anti-Malwares for Battery-Powered Devices , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[33] Yanick Fratantonio,et al. ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors , 2014, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).