Results 141 to 150 of about 31,732 (193)
Some of the next articles are maybe not open access.
2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA), 2014
In this paper, we propose a new method to detect malicious activities on mobile devices by examining an application's runtime behavior. To this end, we use the Xposed framework to build a monitoring module that generates behavior profiles for applications.
Alaa Salman +3 more
openaire +1 more source
In this paper, we propose a new method to detect malicious activities on mobile devices by examining an application's runtime behavior. To this end, we use the Xposed framework to build a monitoring module that generates behavior profiles for applications.
Alaa Salman +3 more
openaire +1 more source
2016
Why should everyone know about mobile malware? With the introduction of Internet of Things (IoT) and Cloud, you can't survive in a disconnected world. Thus from your home appliances to your window curtains, everything is connected to Internet which can be accessed through your hand held mobile device.
Geogen G., Poovammal E.
openaire +1 more source
Why should everyone know about mobile malware? With the introduction of Internet of Things (IoT) and Cloud, you can't survive in a disconnected world. Thus from your home appliances to your window curtains, everything is connected to Internet which can be accessed through your hand held mobile device.
Geogen G., Poovammal E.
openaire +1 more source
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia, 2009
Mobile malware is an increasing threat to the world of handheld devices, which can prove to be costlier than PC viruses in the future. The current method used to combat mobile malware is virus signature matching which is based on the slow process of reverse engineering.
Yean Li Ho, Swee-Huay Heng
openaire +1 more source
Mobile malware is an increasing threat to the world of handheld devices, which can prove to be costlier than PC viruses in the future. The current method used to combat mobile malware is virus signature matching which is based on the slow process of reverse engineering.
Yean Li Ho, Swee-Huay Heng
openaire +1 more source
MDoctor: A Mobile Malware Prognosis Application
2014 IEEE 34th International Conference on Distributed Computing Systems Workshops, 2014Mobile malware is on the rise as the global number of smartphone users grows exponentially. Traditional malware detection and scanning tools only detect malware when devices are actually infected. In previous work, we saw that the presence of applications that occur often with known malware can indicate not only infection status but also potential risk
Asokan N +4 more
openaire +2 more sources
Profiling mobile malware behaviour through hybrid malware analysis approach
2013 9th International Conference on Information Assurance and Security (IAS), 2013Nowadays, the usage of mobile device among the community worldwide has been tremendously increased. With this proliferation of mobile devices, more users are able to access the internet for variety of online application and services. As the use of mobile devices and applications grows, the rate of vulnerabilities exploitation and sophistication of ...
Mohd Zaki Mas'ud +5 more
openaire +1 more source
MAlSim - Mobile Agent Malware Simulator
Proceedings of the First International ICST Conference on Simulation Tools and Techniques for Communications Networks and Systems, 2008One of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures.
Rafal Leszczyna +2 more
openaire +1 more source
MALWARE ANALYSIS ON MOBILE PHONE
eLearning and Software for Education, 2018Reducing physical distances within cyberspace allowed information to travel almost instantly while the international cybercrime phenomenon has risen almost inevitably. Most of the slips in cybersecurity come into being due to a poor management of the online environment, due to a lack of knowledge within the technological features in current use and due
Dragos, Barbieru, Alexandru, STOICA
openaire +1 more source
Malware Development on Mobile Environments
2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), 2016Mobile devices are nowadays adopted almost in every corner of the world. Being them crucial elements of people lives, in direct contact with their owners for the entire day and gathering sensitive information, they unwillingly attract cyber-criminals. The mobile malware phenomenon is currently a serious threat in this context.
Gianluca Papaleo +3 more
openaire +3 more sources
Malware Detection on Mobile Devices
2010 Eleventh International Conference on Mobile Data Management, 2010We present various approaches for mitigating malware on mobile devices which we have implemented and evaluated on Google Android. Our work is divided into the following three segments: a host-based intrusion detection framework; an implementation of SELinux in Android; and static analysis of Android application files.
openaire +1 more source
A Framework for Mobile Malware Forensics
2020 International Conference on Computational Science and Computational Intelligence (CSCI), 2020Mobile malware is a serious threat to mobile devices. Effective forensic investigations are needed to identify malware authors and thwart this growing threat. This paper investigates existing conventional digital forensics tools against mobile malware.
Abdullah Mujawib Alashjaee +1 more
openaire +1 more source

