References
- Jae-Kyung Park, Sang-Yong Choi, "Studing Security Weaknesses of Android System", International Journal of Security and Its Applications, Vol. 9, No.3, pp. 7-12, Mar. 2015. https://doi.org/10.14257/ijsia.2015.9.3.02
- Jae-Kyung Park, Sang-Yong Choi, "An Integrity Checking MechanismUsing Physical Independent Storage for Mobile Device", International Journal Control and Automation, Vol.8, No.3, pp.109-114, Mar. 2015. https://doi.org/10.14257/ijca.2015.8.3.13
- Jae-Kyung Park, "A Realtime Malware Detection Technique Using Multiple Filter", Journal of The Korea Society of Computer and Information, Vol. 19, No.7, pp. 77-85, July 2014. https://doi.org/10.9708/jksci.2014.19.7.077
- Hyo-NamKim, "Realtime hybrid analysis based on multiple profile for prevention of malware", Hongik Univ. Feb. 2014.
- Jae-Kyung Park, Sung-Jin Kim, "The Design of the expanded BYOD solutions for business mobile users", Journal of The Korea Society of Computer and Information, Vol. 10, No.10, pp. 107-115, October 2014.
- Jin-Kyung Kim, "A design of anomaly detection with automata dynamic profile", Hansei Univ., Feb. 2014.
- S. Kimand D. H. Lee, "A study on the vulnerability of integrity verification functions of android-based smartphone banking applications". in Journal of The Korea Institute of Information Security & Cryptology (JKIISC), vol. 23, no. 4, pp. 743-755, Aug. 2013. https://doi.org/10.13089/JKIISC.2013.23.4.743
- Hyo-Nam, Kimand Jae-Kyoung Park and Yoo-Hun Won, "A Study on the Malware Realtime Analysis Systems Using the Finite Automata", Journal of the Korea society of computer and information, Vol.18, No.5, pp.69-76, Apr. 2013. https://doi.org/10.9708/jksci.2013.18.5.069
- H.S. Moon, B.H. Jung, Y.S. Jeon and J.N. Kim, "A Survey of Mobile Malware Detection Techniques", 2013 Electronics and Telecommunications Trends, Vol. 23. No. 3, pp. 39-46, May. 2013.
- Y. Zhou and X. Jiang, "Dissecting AndroidMalware: Characterization and Evolution", Proc 33rd IEEE Symp Security and Privacy, Aug. 2012.
- Mobile security technology research society, "Demand and outlook for mobile security technology", Data collection for Mobile security technology research society seminar, Sept. Jun. 2011.
- Androulidakis, Digital evidence inmobile phones. IT security professional magazine, Issue 13, pp 36-39, Feb. 2010.
- http://www.cnet.com/how-to/protect-yourandroid-device-from-malware/
- http://blog.trendmicro.com/trendlabs-security-intelligence/the-communication-function-ofmalicious-urls/
- http://www.sophos.com/en-us/security-newstrends/security-trends/malware-goes-mobile/10-tips-to-prevent-mobile-malware.aspx
- http://blog.trendmicro.com/trendlabs-securityintelligence/android-installer-hijacking-bugused-as-lure-for-malware/
- http://www.etnews.com/20150210000170
- http://www.siminilbo.co.kr/news/articleView.html?idxno=391594