1 |
Kaspersky Lab, "Kaspersky Security Bulletin 2013, Overall Statistics for 2013," http://media.kaspersky.com/pdf/KSB_2013_EN.pdf.
|
2 |
ZDNET Korea, "AhnLAB, New version of malware 'chest' is rapidly increasing," http://www.zdnet.co.kr/news/news_view.asp?artice_id=20130307162220, Mar. 2013.
|
3 |
Smishing, http://www.police.go.kr/portal/main/contents.do?menuNo=200287
|
4 |
N. Megiddo, P. Alto, and K. S. McCurley, "Efficient Retrieval of Uniform Resource Locators," U.S. Patent No. 6957224 B1, Oct. 2005.
|
5 |
D. Antoniades, I. Polakis, G. Kontaxis, E. Athanasopoulos, S. Ioannidis, E.P.Markatos and T. Karagiannis, "We.b: the web of short urls," WWW '11 Proceedings of the 20th international conference on World wide web, pp. 715-724, Mar. 2011.
|
6 |
Nprotect response team official blog, " circulation of APK using mobile messenger," http://erteam.nprotect.com/464.
|
7 |
Soonil Kim, Sunghoon Kim and Donghoon Lee, "A study on the vulnerability of integrity verification functions of android- based smartphone banking applications," Journal of The Korea Institute of Information Security & Cryptology, 23(4), pp. 743-755, Aug. 2013.
과학기술학회마을
DOI
|
8 |
3GPP, "3GPP TS 23.040 - Technical realization of the Short Message Service(SMS)," 3GPP, Dec. 2013.
|
9 |
Radio Layer Interface, http://www.kandroid.org/online-pdk/guide/telephony.html.
|
10 |
Collin Mulliner and Charlie Miller, "Injecting SMS Messages into Smart Phones for Security Analysis," WOOT'09 Proceedings of the 3rd USENIX confer ence on Offensive technologies, pp. 5-5, Aug. 2009.
|
11 |
Peter Jay Salzman, Michael Burian and Ori Pomerantz, "The Linux Kernel Module Programming Guide," http://www.tldp.org/LDP/lkmpg/2.6/lkmpg.pdf, May. 2007.
|
12 |
Youngseok Choi, Sunghoon Kim and Donghoon Lee, "Study to detect and block leakage of personal information : Android-platform environment," Journal of The Korea Institute of Information Security & Cryptology, 23(4), pp. 757-766, Aug. 2013.
과학기술학회마을
DOI
ScienceOn
|
13 |
Jeonghyeok Kim and Moonsun Bae, "Utilization status of domestic Online banking in 2013," The Bank of Korea, Feb. 2014.
|
14 |
Chao Yang, Vinod Yegneswaran, Phillip Porras and Guofei Gu, "Detecting money- stealing apps in alternative Android markets," CCS '12 Proceedings of the 2012 ACM conference on Computer and communications security, pp. 1034-1036, Oct. 2012.
|
15 |
SMSC, http://en.wikipedia.org/wiki/Short_message_service_center.
|
16 |
Vibha Manjunath and Martin Colley ,"Reverse Engineering Of Malware On Android," 2011 The SANS Institute, Aug. 2011.
|
17 |
W. Enck, M. Ongtang, and P. McDaniel, "On Lightweight Mobile Phone Application Certification," Proceeding CCS '09 Proceedings of the 16th ACM conference on Computer and communications security, pp. 235-245, May. 2009.
|
18 |
Sangho Park and Junhyeong Lee, "Proposal of Smishing Prevention System through Android Permission and Authentication," KIISC REVIEW, 23(6), pp. 5-12, Dec. 2013.
|
19 |
Tiago Almeida, Jose Maria Gomez Hidalgo, Tiago Pasqualini Silva, "Towards SMS Spam Filtering: Results under a New Dataset," International Journal of Information Security Science, vol. 2 no. 1, pp. 1-18, Mar. 2013.
|
20 |
Tae Oh, Bill Stackpole, Emily Cummins, Carlos Gonzalez and Rahul Ramachandran, "Best Security Practices for Android, BlackBerry, and iOS," Enabling Technologies for Smartphone and Internet of Things (ETSIoT), 2012 First IEEE Workshop on, pp. 42-47, Jun. 2012.
|
21 |
Anna Kang, Jaedong Lee, Wonmin Kang, Leonard Barolli and Jonghyuk Park, "Security Considerations for Smart Phone Smishing Attacks," Advances in Computer Science and its Applications, Lecture Notes in Electrical Engineering vol. 279, pp. 467-473, 2014
|