Privilege Escalation Attacks on Android.
Lucas DaviAlexandra DmitrienkoAhmad-Reza SadeghiMarcel WinandyPublished in: ISC (2010)
Keyphrases
- mobile devices
- countermeasures
- detect malicious
- watermarking scheme
- malicious attacks
- security policies
- digital image watermarking
- smart phones
- traffic analysis
- malware detection
- watermarking technique
- data sets
- malicious users
- terrorist attacks
- denial of service attacks
- security threats
- ddos attacks
- database systems
- neural network
- mobile applications
- information security
- intrusion detection
- social networks
- cooperative