Exploring Low Profile Techniques for Malicious Code Detection on Smartphones

[1]  Xinwen Zhang,et al.  A Trusted Mobile Phone Prototype , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[2]  Kang G. Shin,et al.  Propagation, Detection and Containment of Mobile Malware , 2008 .

[3]  Shivakant Mishra,et al.  On rootkit and malware detection in smartphones , 2010, 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W).

[4]  Kang G. Shin,et al.  Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.

[5]  Kang G. Shin,et al.  Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.

[6]  Xiaoxin Chen,et al.  Automated containment of rootkits attacks , 2008, Comput. Secur..

[7]  Songwu Lu,et al.  SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.

[8]  Yajin Zhou,et al.  RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.

[9]  Matthew M. Williamson,et al.  Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[10]  Benjamin Halpert Mobile device security , 2004, InfoSecCD '04.

[11]  Shivakant Mishra,et al.  Location based power analysis to detect malicious code in smartphones , 2011, SPSM '11.

[12]  Sencun Zhu,et al.  Designing System-Level Defenses against Cellphone Malware , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.

[13]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[14]  Jason Flinn,et al.  Virtualized in-cloud security services for mobile devices , 2008, MobiVirt '08.

[15]  Thomas F. La Porta,et al.  From mobile phones to responsible devices , 2011, Secur. Commun. Networks.

[16]  William A. Arbaugh,et al.  Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.