Affiliation:
1. Delhi Technological University, India
2. Indian Institute of Technology Roorkee, India
Abstract
The ever-increasing use of mobile devices for communication and entertainment has made these devices an increasingly attractive target for malicious attacks. Thus, mobile device security has emerged as an important research area. Although malicious exploits for mobile phones have been steadily developing over the last decade, the emergence of smart-phone technology is proving to be a turning point in development of such malicious exploits. With the increase in sophistication of smartphones and their use for day-today activities, mobile threats (e.g., viruses, spyware, and malware) has also increased. This trend can be attributed to the fact that phone users want to communicate, and viruses want to be communicated. This chapter presents a state-of-the-art review of the developments in this important field of mobile malware.
Reference56 articles.
1. Android. (n.d.). Available at http://www.android.com/
2. Bickford, J., Hare, R., Baliga, A., & Ganapathy, V. (2010). Rootkits on Smart Phones: Attacks, Implications and Opportunities. In Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, (pp. 49-54). Academic Press.
3. Bluetooth. (2008). The Bluetooth Special Interest Group. Available at http://www.bluetooth.com/
4. Bose, A., & Shin, K. G. (2006a). Proactive Security for Mobile Messaging Networks. In Proceedings of ACM Workshop on Wireless Security (pp. 95-104). ACM.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Conventional and next generation firewalls in network security and its applications;2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS);2022-11-04