An Opened Eye on you
暂无分享,去创建一个
[1] Fan Zhang,et al. Stealthy video capturer: a new video-based spyware in 3G smartphones , 2009, WiSec '09.
[2] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[3] Sang-Bum Suh,et al. Xen on ARM: System Virtualization Using Xen Hypervisor for ARM-Based Secure Mobile Phones , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.
[4] George Lawton. Is It Finally Time to Worry about Mobile Malware? , 2008, Computer.
[5] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[6] TuchHarvey,et al. The VMware mobile virtualization platform , 2010 .
[7] Patrick D. McDaniel,et al. Understanding Android Security , 2009, IEEE Security & Privacy Magazine.
[8] Xiaoxin Chen,et al. Automated containment of rootkits attacks , 2008, Comput. Secur..
[9] M. Piercy. Embedded devices next on the virus target list , 2004 .
[10] Mikko Hypponen,et al. Malware goes mobile. , 2006, Scientific American.
[11] Tom Martin,et al. Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.
[12] Arati Baliga,et al. Automatic Inference and Enforcement of Kernel Data Structure Invariants , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[13] Arati Baliga,et al. Rootkits on smart phones: attacks, implications and opportunities , 2010, HotMobile '10.
[14] Wayne Jansen,et al. Guidelines on Cell Phone Forensics , 2007 .