Spyware detection system related to wiretapping based on android power consumption and network traffics |
Park, Bum-joon
(Hanyang University)
Lee, Ook (Hanyang University) Cho, Sung-phil (Hanyang University) Choi, Jung-woon (Hanyang University) |
1 | Android (operating system),Wikipedia, 2013.07,http://ko.wikipedia.org/wiki/%EC%95%88%EB%93%9C%EB%A1%9C%EC%9D%B4%EB%93%9C_(%EC%9A%B4%EC%98%81_%EC%B2%B4%EC%A0%9C). |
2 | Symantec internet security threat report, Symantec Corporation, vol.18, pp.10,Apr.2013. |
3 | Aubrey-Derrick Schmidt and Sahin Albayrak ,"Malicious Software for Smartphones," Technical Report, pp.19-20,Feb. 2008. |
4 | Sang Wook Nam, "A study on counterplan of Spyware being abused on the Web," Korea University, pp.1-47, Dec.2014. |
5 | e-Nara Jipyo ,The number of counseling for private information abuse, 2012.,http://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd=1366 |
6 | Jin-young Kim, "2012 Mobile Market Forecasts," ROA CONSULTING, pp.6, Feb.2011. |
7 | Junbong Baik, MyoungHo Choi, Bumseok Hong and Eugene Park, "Variation from Smart Revolution : The Achievements and Tasks," kt economy & business research institution, pp.12, 2012. |
8 | SungIl Kim and Hyunna Cha, "The threats and responses of smartphone hacking," kt economy & business research institution pp.2, 2013. |
9 | Heongdu Park, "The first detetion of tapping-app in korea", The KyungHyang |
10 | Hwashin Moon, Bohong Jung, Yongsup Jeon and Jungnyou Kim, "A Survey of Mobile Malware Detection Techniques," ETRI, pp.5-7, 2013. |
11 | D. Samfat and R. Molva , "IDAMN: An Intrusion Detection Architecture for Mobile Networks," IEEE Journal on Selected Areas in Communications,Vol 15. ,no. 7, pp.1373-1380, Sep. 1997. DOI |
12 | M. Miettinen , P. Halonen and K. Hatonen, "Host-Based Intrusion Detection for Advanced Mobile Devices," In: AINA '06: Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Vol. 2 (AINA'06), Washington, DC, USA, IEEE Computer Society, pp. 72-76, 2006. |
13 | D.C. Nash, T.L. Martin, D.S. Ha and M.S. Hsiao , "Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices," In: PERCOMW'05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, Washington, DC, USA, IEEE Computer Society, pp. 141-145, 2005. |
14 | G.A. Jacoby , R. Marchany and N.J.Davis IV. , "How mobile host batteries can improve network security," IEEE Security and Privacy, Vol 4., no 5.,pp. 40-49, 2006. |
15 | Audio, Multimedia, Bit_rate : http://en.wikipedia.org/wiki/Bit_rate |
16 | J. Cheng, S.H. Wong, H. Yang and S. Lu, "Smartsiren: virus detection and alert for smartphones," In: MobiSys '07: Proceedings of the 5th iternational conference on Mobile systems, applications and services, New York, NY, USA, ACM, pp. 258-271, 2007 |