Sensing-enabled channels for hard-to-detect command and control of mobile devices

作者: Ragib Hasan , Nitesh Saxena , Tzipora Haleviz , Shams Zawoad , Dustin Rinehart

DOI: 10.1145/2484313.2484373

关键词:

摘要: … can also be used for out-of-band communication among malware infected devices as well … of attack against mobile devices, the purpose of this work is ethically sound and constructive. …

参考文章(29)
Theodore Reed, Joseph Geis, Sven Dietrich, None, SkyNET: a 3G-enabled mobile attack drone and stealth botmaster WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies. pp. 4- 4 ,(2011)
Nitesh Saxena, James H. Watt, Authentication technologies for the blind or visually impaired usenix conference on hot topics in security. pp. 7- 7 ,(2009)
Mokhtar Aboelaze, Ayman Elnaggar, Reducing Memory References for FFT Calculation. CDES. pp. 141- 145 ,(2006)
Woong Ki Park, Mobile Phone Addiction Mobile Communications. pp. 253- 272 ,(2005) , 10.1007/1-84628-248-9_17
Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov, Stegobot: a covert social network botnet information hiding. pp. 299- 313 ,(2011) , 10.1007/978-3-642-24178-9_21
Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee, Evaluating Bluetooth as a medium for botnet command and control international conference on detection of intrusions and malware and vulnerability assessment. pp. 61- 80 ,(2010) , 10.1007/978-3-642-14215-4_4
Yin Lihua, Zang Tianning, Liu Xiaoyi, Fang Binxing, Cui Xiang, Andbot: towards advanced mobile botnets usenix conference on large scale exploits and emergent threats. pp. 11- 11 ,(2011)
Ronald Kainda, Ivan Flechais, A. W. Roscoe, Two heads are better than one: security and usability of device associations in group scenarios symposium on usable privacy and security. pp. 5- ,(2010) , 10.1145/1837110.1837117
Hahnsang Kim, Joshua Smith, Kang G. Shin, Detecting energy-greedy anomalies and mobile malware variants Proceeding of the 6th international conference on Mobile systems, applications, and services - MobiSys '08. pp. 239- 252 ,(2008) , 10.1145/1378600.1378627
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun, Caveat eptor: A comparative study of secure device pairing methods 2009 IEEE International Conference on Pervasive Computing and Communications. pp. 1- 10 ,(2009) , 10.1109/PERCOM.2009.4912753