Uncloaking Rootkits on Mobile Devices with a Hypervisor-Based Detector.
Julian VetterMatthias Junker-PetschickJan NordholzMichael PeterJanis DanisevskisPublished in: ICISC (2015)
Keyphrases
- mobile devices
- context aware
- operating system
- mobile phone
- virtual machine
- mobile learning
- smart phones
- mobile applications
- mobile computing
- learning activities
- mobile users
- mobile services
- mobile environments
- mobile computing devices
- detection method
- detection algorithm
- mobile technologies
- mobile networks
- network resources
- embedded devices
- location aware
- mobile terminals
- tablet computers
- e learning