2011
DOI: 10.1007/978-3-642-21554-4_2
|View full text |Cite
|
Sign up to set email alerts
|

A Specification Based Intrusion Detection Framework for Mobile Phones

Abstract: Abstract. With the fast growth of mobile market, we are now seeing more and more malware on mobile phones. One common pattern of many commonly found malware on mobile phones is that: the malware always attempts to access sensitive system services on the mobile phone in an unobtrusive and stealthy fashion. For example, the malware may send messages automatically or stealthily interface with the audio peripherals on the device without the user's awareness and authorization. To detect the unauthorized malicious b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 17 publications
0
15
0
Order By: Relevance
“…The most closely related work to ours is the one proposed in [11]. It shares similar philosophy as ours.…”
Section: A Malware Detection and Preventionmentioning
confidence: 70%
See 3 more Smart Citations
“…The most closely related work to ours is the one proposed in [11]. It shares similar philosophy as ours.…”
Section: A Malware Detection and Preventionmentioning
confidence: 70%
“…This is because the pickpocket malware gets activated by user's playing the tictac-toe game, which already involves touch screen activity that can generate hardware interrupts. The difference between [11] and our work can be summarized as follows. [11] attempts to check whether there is (any) user activity whereas our goal is to check whether there is a special user-aware activity.…”
Section: A Malware Detection and Preventionmentioning
confidence: 97%
See 2 more Smart Citations
“…Furthermore, specification-based IDSs were developed for specific use cases both for network-based (e.g., VoIP technologies [100], carrier Ethernet [101]) and host-based security (e.g., kernel dynamic data structures [102], mobile operating systems [103]). …”
Section: Specification-based Intrusion Detectionmentioning
confidence: 99%