Analysis of Threats and Countermeasures on Mobile Smartphone |
Jeon, Woong-Ryul
(Sungkyunkwan University)
Kim, Jee-Yeon (Sungkyunkwan University) Lee, Young-Sook (Howon University) Won, Dong-Ho (Sungkyunkwan University) |
1 | Collin Richard Mulliner, "Security of Smart Phone," Master's Thesis of University of California, 2006. 06. |
2 | Andrew Monk, Evi Fellas, Eleanor Ley, "Hearing only one side of normal and mobile phone conversations," Behaviour & Informaion Technology, Volume 23, Issue 5, 2004. 09. |
3 | http://threatcenter.smobilesystems.com |
4 | Xudong Ni, Zhimin Yang, Xiaole Bai, Adam C. Champion, and Dong Xuan, "DiffUser : Differentiated User Access Control on Smartphones," Proc. 5th IEEE Int'l. Workshop on Wireless and Sensor Networks Security (WSNS '09), 2009. 09. |
5 | Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Jan Clausen, Ahmet Camtepe, and Sahin Albayrak, "Enhancing Security of Linux-Based Android Devices," 15th International Linux Kongress, 2008. 10. |
6 | Jengchung V. Chen, David C. Yen, Kuanchin Chen, "The acceptance and diffusion of the innovative smart phone use: A case study of a delivery service company in logistics," Information & Management Volume 46, Issue 4, 2009. 03. |
7 | http://seriot.ch/resources/talks_papers/iPhonePrivacy.pdf |
8 | http://www.mt.co.kr/view/mtview.php |
9 | Asaf Shabtai, Yuval Fledel, Uri Kanonov, Yuval Elovici, Shlomi Dolev, "Google Android : A State of the Art Review of Security Mechanisms", arXiv 2009, 2009. 11. |
10 | Chuanxiong Guo, Helen J. Wang, Wenwu Zhu, "Smart-Phone Attacks and Defenses," HotNets III, 2004. 11. |