A Mobile Phone Malicious Software Detection Model with Behavior Checker
There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attack...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 65 |
---|---|
container_issue | |
container_start_page | 57 |
container_title | |
container_volume | |
creator | Yap, Teck Sung Ewe, Hong Tat |
description | There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented. |
doi_str_mv | 10.1007/11527725_7 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_17026571</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17026571</sourcerecordid><originalsourceid>FETCH-LOGICAL-c259t-9093ae6443bd5b037558836d67bdcad379353adc646cbdaa84e5d93087562d2c3</originalsourceid><addsrcrecordid>eNpFkLtOwzAYRs1NopQuPIEXJJaA7T--jaVAQWoFEjBHju0S0xBXdqDi7QkCwXSGc_QNH0InlJxTQuQFpZxJyXgld9BESwW8JEAVUWoXjaigtAAo9d6fYwOI2EcjAoQVWpZwiI5yfiVkUJqN0HyKl7EOrccPTew8Xpo22BDfM36Mq35rksdXvve2D7EbSudbvA19gy99Yz5CTHjWeLv26RgdrEyb_eSXY_R8c_00uy0W9_O72XRRWMZ1X2iiwXhRllA7XhOQnCsFwglZO2scSA0cjLOiFLZ2xqjSc6eBKMkFc8zCGJ3-7G5MtqZdJdPZkKtNCm8mfVZUEia4pEN39tPlQXUvPlV1jOtcUVJ9H1n9HwlfLt1efw</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A Mobile Phone Malicious Software Detection Model with Behavior Checker</title><source>Springer Books</source><creator>Yap, Teck Sung ; Ewe, Hong Tat</creator><contributor>Ling, Tok-Wang ; Ichii, Shingo ; Shimojo, Shinji ; Song, Kwan-Ho</contributor><creatorcontrib>Yap, Teck Sung ; Ewe, Hong Tat ; Ling, Tok-Wang ; Ichii, Shingo ; Shimojo, Shinji ; Song, Kwan-Ho</creatorcontrib><description>There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540278306</identifier><identifier>ISBN: 3540278303</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540318088</identifier><identifier>EISBN: 3540318089</identifier><identifier>DOI: 10.1007/11527725_7</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Computer Virus ; Exact sciences and technology ; Integrity Checker ; Malicious Activity ; Malicious Attack ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Mobile Phone ; Software</subject><ispartof>Lecture notes in computer science, 2005, p.57-65</ispartof><rights>Springer-Verlag Berlin Heidelberg 2005</rights><rights>2005 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c259t-9093ae6443bd5b037558836d67bdcad379353adc646cbdaa84e5d93087562d2c3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11527725_7$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11527725_7$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4048,4049,27924,38254,41441,42510</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17026571$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Ling, Tok-Wang</contributor><contributor>Ichii, Shingo</contributor><contributor>Shimojo, Shinji</contributor><contributor>Song, Kwan-Ho</contributor><creatorcontrib>Yap, Teck Sung</creatorcontrib><creatorcontrib>Ewe, Hong Tat</creatorcontrib><title>A Mobile Phone Malicious Software Detection Model with Behavior Checker</title><title>Lecture notes in computer science</title><description>There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Computer Virus</subject><subject>Exact sciences and technology</subject><subject>Integrity Checker</subject><subject>Malicious Activity</subject><subject>Malicious Attack</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Mobile Phone</subject><subject>Software</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540278306</isbn><isbn>3540278303</isbn><isbn>9783540318088</isbn><isbn>3540318089</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpFkLtOwzAYRs1NopQuPIEXJJaA7T--jaVAQWoFEjBHju0S0xBXdqDi7QkCwXSGc_QNH0InlJxTQuQFpZxJyXgld9BESwW8JEAVUWoXjaigtAAo9d6fYwOI2EcjAoQVWpZwiI5yfiVkUJqN0HyKl7EOrccPTew8Xpo22BDfM36Mq35rksdXvve2D7EbSudbvA19gy99Yz5CTHjWeLv26RgdrEyb_eSXY_R8c_00uy0W9_O72XRRWMZ1X2iiwXhRllA7XhOQnCsFwglZO2scSA0cjLOiFLZ2xqjSc6eBKMkFc8zCGJ3-7G5MtqZdJdPZkKtNCm8mfVZUEia4pEN39tPlQXUvPlV1jOtcUVJ9H1n9HwlfLt1efw</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Yap, Teck Sung</creator><creator>Ewe, Hong Tat</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>A Mobile Phone Malicious Software Detection Model with Behavior Checker</title><author>Yap, Teck Sung ; Ewe, Hong Tat</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c259t-9093ae6443bd5b037558836d67bdcad379353adc646cbdaa84e5d93087562d2c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Computer Virus</topic><topic>Exact sciences and technology</topic><topic>Integrity Checker</topic><topic>Malicious Activity</topic><topic>Malicious Attack</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Mobile Phone</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yap, Teck Sung</creatorcontrib><creatorcontrib>Ewe, Hong Tat</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yap, Teck Sung</au><au>Ewe, Hong Tat</au><au>Ling, Tok-Wang</au><au>Ichii, Shingo</au><au>Shimojo, Shinji</au><au>Song, Kwan-Ho</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A Mobile Phone Malicious Software Detection Model with Behavior Checker</atitle><btitle>Lecture notes in computer science</btitle><date>2005</date><risdate>2005</risdate><spage>57</spage><epage>65</epage><pages>57-65</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540278306</isbn><isbn>3540278303</isbn><eisbn>9783540318088</eisbn><eisbn>3540318089</eisbn><abstract>There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11527725_7</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Lecture notes in computer science, 2005, p.57-65 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_17026571 |
source | Springer Books |
subjects | Applied sciences Computer science control theory systems Computer systems and distributed systems. User interface Computer Virus Exact sciences and technology Integrity Checker Malicious Activity Malicious Attack Memory and file management (including protection and security) Memory organisation. Data processing Mobile Phone Software |
title | A Mobile Phone Malicious Software Detection Model with Behavior Checker |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T19%3A13%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20Mobile%20Phone%20Malicious%20Software%20Detection%20Model%20with%20Behavior%20Checker&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Yap,%20Teck%20Sung&rft.date=2005&rft.spage=57&rft.epage=65&rft.pages=57-65&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540278306&rft.isbn_list=3540278303&rft_id=info:doi/10.1007/11527725_7&rft_dat=%3Cpascalfrancis_sprin%3E17026571%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540318088&rft.eisbn_list=3540318089&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |