X. Kou and Q. Wen, “Intrusion detection model based on android”,Broadband Network and Multimedia Technology (IC-BNMT), pp. 624-628,2011.
W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel and A. Sheth, "TaintDroid: An information-flow tracking system for realtimeprivacy monitoring on smartphones", In Proceedings of the 9th USENIXSymposium on Operating Systems Design and Implementation., pp. 1-6,2010.
W. Ench, M. Ongtang and P. McDaniel, "On lightweight mobile phoneapplication certification", In Proceedings of the 16th ACM conference onComputer and communications security (CCS'09), pp. 235-245, 2009.
S. Kim, D. Choi and B. An, "Detection and Prevention Method byAnalyzing Malignant Code of Malignant Bot", The journal of the Instituteof Internet Broadcasting and Communication, vol. 13, no. 2, pp. 199-207,2013
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. “Thesearen’t the droids you’re looking for : Retrofitting Android to protect datafrom imperious applications,“ In Proceedings of the 18th ACM Conferenceon Computer and Communications Security (CCS 2011), pp. 639-652, Oct. 2011.
M. Becher, F.C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck and C. Wolf, "Mobile Security Catching Up? Revealing the Nuts and Bolts of theSecurity of Mobile Devices", In Proceedings of the 2011 IEEE Symposiumon Security and Privacy (SP'11), pp.96-111, 2011.
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Sencun Zhu, “pBMDS ABehavior-based Malware Detection System for Cellphone Devices”, WiSec'10 Proceedings of the third ACM conference on Wireless network security,pp. 37-48, 2010
L. Liu, G. Yan, X. Zhang, and S. Chen, "VirusMeter: Preventing YourCellphone from Spies", In Proceedings of the 12th International Symposiumon Recent Advances in Intrusion Detection (RAID'09)., pp. 244-264, 2009.
K. Singh, S. Sangal, N. Jain, P. Traynor, and W. Lee, "Evaluatingbluetooth as a medium for botnet command and control", Detection ofIntrusions and Malware, and Vulnerability Assessment, vol. 6201, pp. 61-80,2010.
K. Shin, U. Park and M. Jun, "A Design of SMS DDoS Detection andDefense Method using Counting Bloom Filter", Proceedings of the KAISFall Conference, vol. 1, pp. 53-56, 2011.
K. J. Houle and G. M. Weaver, "Trends in Denial of Service AttackTechnology", CERT and CERT Coordination Center are registered in theU.S. Patent and Trademark Office, Oct 2001
J. Cheng, S.H.Y. Wong, H. Yang, and S. Lu, "SmartSiren: virusdetection and alert for smartphones", In Proceedings of the 5th internationalconference on Mobile systems, applications and services (MobiSys'07), pp. 258-271, 2007.
J. Baek and J. Park, "A study of analysis and improvement of securityvulnerability in Bluetooth for data transfer", Journal of the KoreaAcademia-Industrial cooperation Society. vol. 12, no. 6, pp. 2801-2806, 2011.
J. B. Grizzard, V. Sharma, C. Nunnery, Brent, B. Kang and D. Dagon,"Peer-to-Peer Botnets: Overview and Case Study", USENIX, 2007
I. Burguera, U. Zurutuza, S. Nadjm-Tehrani, “CrowdroidBehavior-Based Malware Detection System”, SPSM '11 Proceedings of the1st ACM workshop on Security and privacy in smartphones and mobiledevices, pp. 15-26, 2011
H. Yang, "A Study of Security Weaknesses of QR Codes and ItsCountermeasures", The journal of the Institute of Internet Broadcasting andCommunication, vol. 12, no. 1, pp. 83-89, 2012.
G. Weidman. "Transparent botnet command and control for smartphonesover SMS", Proceedings of Shmoocon., 2011.
G. Russello, B. Crispo, E. Fernandes and Y. Zhauniarovich, “YAASE:Yet Another Android Security Extension, Privacy, security, risk and trust(passat)”, 2011 ieee third international conference on and 2011 ieee thirdinternational conference on social computing (socialcom), pp. 1033-1040, Oct2011
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, "ParanoidAndroid: versatile protection for smartphones", In Proceedings of the 26thAnnual Computer Security Applications Conference (ACSAC'10), pp. 347-356, 2010.
G. Geng, G. Xu, M. Zhang, Y. Guo, G. Yang, and C. Wei. "The designof SMS based heterogeneous mobile botnet", Journal of Computers., vol. 7,no. 1, pp. 235-243, 2012.
G. Dini, F. Martinelli, A. Saracino, and D. Sgandurra, "MADAM: AMulti-level Anomaly Detector for Android Malware", In Proceedings of the6th International Conference on Mathematical Methods, Models, andArchitectures for Computer Network Security (MMM-ACNS'12), pp. 240-253,2012.
E. Chain, A.P. Felt, K. Greenwood, and D. Wagner, "AnalyzingInter-Application Communication in Android", In Proceedings of the 9thInternational Conference on Mobile Systems, Applications, and Services(MobiSys'11), pp. 239-252, 2011
D. Venugopal and G. Hu, “Efficient signature based malware detectionon mobile devices”, Mobile Information Systems, vol 4, no. 1, pp. 33-49,2008
C. Mulliner and J. Seifert, "Rise of the ibots: Owning a telco network",In Proceedings of the 5th IEEE International Conference on Malicious andUnwanted Software (Malware), pp. 19-20, 2010.
B. Saha and A. Gairola, “Botnet: An Overview”, CERT-In White Paper,CIWP-2005-05, pp. 3-12, May 2005.
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer and YaelWeiss, “Andromaly : a behavioral malware detection framework for androiddevices”, JOURNAL OF INTELLIGENT INFORMATION SYSTEMS Volume38, Number 1, pp.161-190, 2012
Adam P. Fuchs, Avik Chaudhuri, and Jeffrey S. Foster, “ScanDroidAutomated Security Certification of Android Applications”, 2011
A. Karasaridis, B. Rexroad and D. Hoeflin, “Wide-Scale botnetdetection and characterization”, HotBots'07 Proceedings of the firstconference on First Workshop on Hot Topics in Understanding Botnets, pp. 1-8, 2007
A. Bose, Xin Hu, K. G. Shin and T. Park, “Behavioral Detection ofMalware on Mobile Handsets”, MobiSys 08 Proceedings of the 6thinternational conference on Mobile systems, applications, and services, pp. 225-238, 2008
'
스마트폰 상태 정보를 이용한 효율적인 봇 탐지 기법 = An Efficient Bot Detection Scheme Using Smartphone Status Information'
의 유사주제(
) 논문