Exploring Low Profile Techniques for Malicious Code Detection on Smartphones
暂无分享,去创建一个
[1] Xinwen Zhang,et al. A Trusted Mobile Phone Prototype , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.
[2] Kang G. Shin,et al. Propagation, Detection and Containment of Mobile Malware , 2008 .
[3] Shivakant Mishra,et al. On rootkit and malware detection in smartphones , 2010, 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W).
[4] Kang G. Shin,et al. Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.
[5] Kang G. Shin,et al. Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.
[6] Xiaoxin Chen,et al. Automated containment of rootkits attacks , 2008, Comput. Secur..
[7] Songwu Lu,et al. SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.
[8] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[9] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[10] Benjamin Halpert. Mobile device security , 2004, InfoSecCD '04.
[11] Shivakant Mishra,et al. Location based power analysis to detect malicious code in smartphones , 2011, SPSM '11.
[12] Sencun Zhu,et al. Designing System-Level Defenses against Cellphone Malware , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.
[13] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[14] Jason Flinn,et al. Virtualized in-cloud security services for mobile devices , 2008, MobiVirt '08.
[15] Thomas F. La Porta,et al. From mobile phones to responsible devices , 2011, Secur. Commun. Networks.
[16] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.