Security add-ons for mobile platforms

作者: Benjamin Adolphi , Hanno Langweg

DOI: 10.1007/978-3-642-34210-3_2

关键词:

摘要: We give an overview of existing security software on mobile platforms in form firewalls and antivirus software. investigate whether these solutions increase the platforms, what limitations platforms' policies present how current work.

参考文章(18)
G.A. Jacoby, N.J. Davis, Battery-based intrusion detection global communications conference. ,vol. 4, pp. 2250- 2255 ,(2004) , 10.1109/GLOCOM.2004.1378409
Timothy Vidas, Nicolas Christin, Daniel Votipka, All your droid are belong to us: a survey of current android attacks WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies. pp. 10- 10 ,(2011)
Farnam Jahanian, Jon Oberheide, Evan Cooke, CloudAV: N-version antivirus in the network cloud usenix security symposium. pp. 91- 106 ,(2008)
Adrienne Porter Felt, Kate Greenwood, David Wagner, The effectiveness of application permissions usenix conference on web application development. pp. 7- 7 ,(2011)
Fred Cohen, Computer viruses Computers & Security. ,vol. 6, pp. 22- 35 ,(1987) , 10.1016/0167-4048(87)90122-2
Daniel V. Hoffman, Jon Friedman, Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses Information-Knowledge-Systems Management archive. ,vol. 7, pp. 159- 180 ,(2008) , 10.5555/1402701.1402714
Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Leonid Batyuk, Jan Hendrik Clausen, Seyit Ahmet Camtepe, Sahin Albayrak, Can Yildizli, Smartphone malware evolution revisited: Android next target? international conference on malicious and unwanted software. pp. 1- 7 ,(2009) , 10.1109/MALWARE.2009.5403026
Mikko Hypponen, Malware Goes Mobile Scientific American. ,vol. 295, pp. 70- 77 ,(2006) , 10.1038/SCIENTIFICAMERICAN1106-70
Leonid Batyuk, Markus Herpich, Seyit Ahmet Camtepe, Karsten Raddatz, Aubrey-Derrick Schmidt, Sahin Albayrak, Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications international conference on malicious and unwanted software. pp. 66- 72 ,(2011) , 10.1109/MALWARE.2011.6112328