On the Feasibility of Malware Attacks in Smartphone Platforms.
Alexios MylonasStelios DritsasBill TsoumasDimitris GritzalisPublished in: ICETE (Selected Papers) (2011)
Keyphrases
- detect malicious
- malicious code
- detecting malicious
- attack scenarios
- mobile applications
- mobile devices
- reverse engineering
- attack detection
- malicious attacks
- static analysis
- malware detection
- anti virus
- security mechanisms
- watermarking scheme
- traffic analysis
- denial of service attacks
- countermeasures
- data sets
- cryptographic protocols
- alert correlation
- multistage
- operating system
- chosen plaintext