Computer viruses: theory and experiments
Computers and Security
Model-Carrying Code (MCC): a new paradigm for mobile-code security
Proceedings of the 2001 workshop on New security paradigms
Handbook of Applied Cryptography
Handbook of Applied Cryptography
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Data Mining Methods for Detection of New Malicious Executables
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Proceedings of the 2003 ACM workshop on Rapid malcode
ISSTA '04 Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis
Semantics-Aware Malware Detection
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Bro: a system for detecting network intruders in real-time
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Hi-index | 0.00 |
Recently, the damages from malware on the mobile devices are increasing rapidly though commercial anti-virus software detects the malware. Generally, the anti-virus program checks and heals well-known malware based on their signature which can identify itself. Though the malware attacks are evolved fast enough, anti-virus software based on signature cannot detect it effectively when they cannot update its signature. In this paper, we are describing a design of malware tool which can prevent viruses, worm, and other threats from entering the mobile industrial devices.