The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense
Detecting energy-greedy anomalies and mobile malware variants
Proceedings of the 6th international conference on Mobile systems, applications, and services
Information-Knowledge-Systems Management - Enterprise Mobility: Applications, Technologes and Strategies
CloudAV: N-version antivirus in the network cloud
SS'08 Proceedings of the 17th conference on Security symposium
Virtualized in-cloud security services for mobile devices
Proceedings of the First Workshop on Virtualization in Mobile Computing
VirusMeter: Preventing Your Cellphone from Spies
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Google Android: A Comprehensive Security Assessment
IEEE Security and Privacy
Paranoid Android: versatile protection for smartphones
Proceedings of the 26th Annual Computer Security Applications Conference
The effectiveness of application permissions
WebApps'11 Proceedings of the 2nd USENIX conference on Web application development
All your droid are belong to us: a survey of current android attacks
WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies
A survey of mobile malware in the wild
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Personal firewalls-One more step towards comprehensive security
Network Security
MALWARE '11 Proceedings of the 2011 6th International Conference on Malicious and Unwanted Software
Hi-index | 0.00 |
We give an overview of existing security software on mobile platforms in form of firewalls and antivirus software. We investigate whether these solutions increase the security on mobile platforms, what limitations the platforms' security policies present and how current solutions work.