Sciweavers

17 search results - page 1 / 4
» Defending Mobile Phones from Proximity Malware
Sort
View
INFOCOM
2009
IEEE
13 years 11 months ago
Defending Mobile Phones from Proximity Malware
—As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable cha...
Gjergji Zyba, Geoffrey M. Voelker, Michael Liljens...
CCS
2009
ACM
13 years 9 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
INFOCOM
2007
IEEE
13 years 11 months ago
Modeling Malware Propagation in Networks of Smart Cell Phones with Spatial Dynamics
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have have bought to the forefront the seriousness of the security threat to this increasingly popular...
Krishna K. Ramachandran, Biplab Sikdar
MOBISEC
2009
Springer
13 years 11 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
COMSNETS
2012
168views more  COMSNETS 2012»
12 years 20 days ago
Limitations of scanned human copresence encounters for modelling proximity-borne malware
—Patterns of human encounters, which are difficult to observe directly, are fundamental to the propagation of mobile malware aimed at infecting devices in spatial proximity. We ...
James Mitchell, Eamonn O'Neill, Gjergji Zyba, Geof...