Mobile Phones as Computing Devices: The Viruses are Coming!
IEEE Pervasive Computing
HOTOS'05 Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Pocket Hypervisors: Opportunities and Challenges
HOTMOBILE '07 Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
Enhancing web browsing security on public terminals using mobile composition
Proceedings of the 6th international conference on Mobile systems, applications, and services
When Malware Attacks (Anything but Windows)
IEEE Security and Privacy
CloudAV: N-version antivirus in the network cloud
SS'08 Proceedings of the 17th conference on Security symposium
Virtualized in-cloud security services for mobile devices
Proceedings of the First Workshop on Virtualization in Mobile Computing
On cellular botnets: measuring the impact of malicious devices on a cellular network core
Proceedings of the 16th ACM conference on Computer and communications security
Cryptanalysis of alleged A5 stream cipher
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Managing smart phone security risks
2010 Information Security Curriculum Development Conference
Security versus energy tradeoffs in host-based mobile malware detection
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
ACM SIGMOBILE Mobile Computing and Communications Review
Quality factors in development best practices for mobile applications
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Mobile cloud computing: A survey
Future Generation Computer Systems
Security add-ons for mobile platforms
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Analysis of the communication between colluding applications on modern smartphones
Proceedings of the 28th Annual Computer Security Applications Conference
What you see predicts what you get—lightweight agent-based malware detection
Security and Communication Networks
Concepts for mobile programming
Proceedings of the 18th ACM conference on Innovation and technology in computer science education
Slicing droids: program slicing for smali code
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Design of trustworthy smartphone-based multimedia services in cultural environments
Electronic Commerce Research
HCI International'13 Proceedings of the 15th international conference on Human Interface and the Management of Information: information and interaction for health, safety, mobility and complex environments - Volume Part II
Hi-index | 0.00 |
Sophisticated consumer mobile devices continue to approach the capabilities and extensibility of traditional computing environments. Unfortunately, these new capabilities and applications make mobile devices an enticing target for attackers and malicious software. Due to such threats, the domain of mobile security has been getting a considerable amount of attention. However, current approaches have failed to consider key differences and their practical impact on the security of modern platforms when adopting techniques from non-mobile (or "fixed") environments. To help demystify mobile security and guide future research, we examine the unique challenges of mobile environments ranging from hardware to software to usability, delve in the diverse security models of current mobile platforms, and present our five commandments of mobile security research.