Rootkits on Smart Phones: Attacks and Implications

Liviu Iftode , Arati Baliga , Vinod Ganapathy , Jeffrey Bickford

1
2009
Security versus energy tradeoffs in host-based mobile malware detection

Jeffrey Bickford , H. Andrés Lagar-Cavilla , Alexander Varshavsky , Vinod Ganapathy
Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys '11 225 -238

44
2011
Detecting Targeted Attacks by Multilayer Deception

Wei Wang , Jeffrey Bickford , Ilona Murynets , Ramesh Subbaraman
Journal of Cyber Security and Mobility 2 ( 2) 175 -199

15
2013
Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware

Arati Baliga , Jeffrey Bickford , Neil Daswani ,
Journal of Cyber Security and Mobility 3 ( 2) 181 -212

4
2014
Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks

Wei Wang , Mikhail Istomin , Jeffrey Bickford
Network and System Security 3 -17

1
2015
Detecting Malicious Activity on Smartphones Using Sensor Measurements

Roger Piqueras Jover , Ilona Murynets , Jeffrey Bickford
Network and System Security 475 -487

2015
What you see predicts what you get—lightweight agent-based malware detection

Wei Wang , Ilona Murynets , Jeffrey Bickford , Christopher Van Wart
Security and Communication Networks 6 ( 1) 33 -48

11
2013
WhatApp: Modeling mobile applications by domain names

Wei Wang , Jeffrey Bickford
wireless and mobile computing, networking and communications 1 -10

2
2016
Towards synchronization of live virtual machines among mobile devices

Jeffrey Bickford , Ramón Cáceres ,
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications - HotMobile '13 13

5
2013
Catching the Wily Hacker: A multilayer deception system

Wei Wang , Jeffrey Bickford , Ilona Murynets , Ramesh Subbaraman
2012 35th IEEE Sarnoff Symposium 1 -6

13
2012
Rootkits on smart phones: attacks, implications and opportunities

Jeffrey Bickford , Ryan O'Hare , Arati Baliga , Vinod Ganapathy
workshop on mobile computing systems and applications 49 -54

108
2010
Safe Internet Browsing Using a Transparent Virtual Browser

Jeffrey Bickford , Paul Giura
international conference on cyber security and cloud computing 423 -432

4
2015
Traffic backfilling: subsidizing lunch for delay-tolerant applications in UMTS networks

H Andrés Lagar-Cavilla , Kaustubh Joshi , Alexander Varshavsky , Jeffrey Bickford
1 -5

25
2011
Balancing malware rootkit detection with power consumption on mobile devices

Horacio Andres Lagar-Cavilla , Jeffrey Bickford , Vinod Ganapathy , Liviu Iftode

23
2013
Method and apparatus for ranking apps in the wide-open internet

Andrea G Forte , Baris Coskun , Qi Shen , Ilona Murynets

19
2014
Method and apparatus for robust mobile application fingerprinting

Andrea G Forte , Baris Coskun , Qi Shen , Ilona Murynets

9
2014
Method and apparatus for searching for software applications

Andrea G Forte , Baris Coskun , Qi Shen , Ilona Murynets

2
2014
Method and apparatus for deriving and using trustful application metadata

Andrea G Forte , Baris Coskun , Qi Shen , Ilona Murynets

2017
Method and apparatus for deriving and using trustful application metadata

Andrea G Forte , Baris Coskun , Qi Shen , Ilona Murynets

2016