A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Mobile Malware and Smart Device Security: Trends, Challenges and Solutions
2013
2013 19th International Conference on Control Systems and Computer Science
We identified mobile malware as one of the main issue in the smart devices' security. ...
Then we propose and discuss an integrated security solution for cyber security in smart devices to tackle the issue. ...
Botnets are slowly moving towards smart devices since those devices are now basically everywhere, powerful enough to run a bot and offer additional gains for a bot-master such as financial gains as discussed ...
doi:10.1109/cscs.2013.27
dblp:conf/cscs/AraboP13
fatcat:j4e7fxcesnfblpp24dx4a6v5li
Evolution, Detection and Analysis of Malware for Smart Devices
2014
IEEE Communications Surveys and Tutorials
Smart devices equipped with powerful sensing, computing and networking capabilities have proliferated lately, ranging from popular smartphones and tablets to Internet appliances, smart TVs, and others ...
This article examines the problem of malware in smart devices and recent progress made in detection techniques. ...
ACKNOWLEDGEMENTS We thank the anonymous reviewers for valuable suggestions that helped to improve the quality and organization of this paper. ...
doi:10.1109/surv.2013.101613.00077
fatcat:u7qjrw4grvcorjjmy3ykddjeda
A Review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices
2016
International Journal on Cyber Situational Awareness
Malware is one of the serious threats posed to smartphones by the attackers. Due to the limited resources of mobile devices malware detection on these devices remains a challenge. ...
Malware detection techniques based on energy-consumption anomaly present several advantages to circumvent the resource constraints of mobile devices. ...
Al Housani et al. (2012) proposed a smart anti-malware that can shift between different security levels according to the assets value and the battery status of the resource-constrained device. ...
doi:10.22619/ijcsa.2016.1001010
fatcat:i3fjq66najeehbv5infkegzl5m
Ransomware protection in IoT using software defined networking
2020
International Journal of Electrical and Computer Engineering (IJECE)
The negligence towards the IoT ransomware can result in disastrous outcomes. ...
The IoT is also vulnerable to many cyber threats, owing to its limited resources and battery operation. ...
ACKNOWLEDGEMENTS The authors are grateful to MANF UGC, Govt. of India for providing financial support under MANF-UGC (MANF-2015-17-JAM-60506) programme to carry out this work. ...
doi:10.11591/ijece.v10i3.pp3166-3175
fatcat:o7qadmiifjfmlclmgda7ibiyda
Anatomy of Threats to The Internet of Things
2018
IEEE Communications Surveys and Tutorials
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of smart devices. ...
However, at the same time, numerous threats to the availability and privacy of the user data, message and device integrity, the vulnerability of IoT devices to malware attacks and the risk of physical ...
Secure reboot of RT-IoT devices To recover from malware that resides in the RAM [176] automation such as power plants, intelligent traffic control system, railways, smart grids, and smart cities. ...
doi:10.1109/comst.2018.2874978
fatcat:5qkflaozurb4nctkfrwswnbce4
Features for Detecting Malware on Computing Environments
2016
International Journal of Engineering and Applied Computer Science
Malware is the main threat for all computing environments. It also acts as launching platform for many other cyber threats. ...
Various types of features are extracted and being researched with machine learning approach to detect malware that are targeted towards computing environments. ...
devices and limited with small battery. ...
doi:10.24032/ijeacs/0102/01
fatcat:xyn5ealf5nb4jgoybi6phf7otq
Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models
[chapter]
2014
Lecture Notes in Computer Science
Malware for current smartphone platforms is becoming increasingly sophisticated. ...
Our results show that the properties of these models follow a power-law distribution: a fact that facilitates an efficient generation of automatic testing patterns tailored for individual users, when done ...
Acknowledgment We are very grateful to the anonymous reviewers for constructive feedback and insightful suggestions that helped to improve the quality of the original manuscript. The work of G. ...
doi:10.1007/978-3-319-11203-9_11
fatcat:na7wxu2lznfm3odsrz7wc3wpyq
Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software
[chapter]
2015
Lecture Notes in Computer Science
We then translate our findings into a set of design guidelines for reducing the energy footprint of modern AVs for mobile devices. ...
Modern smartphones, with their plethora of application scenarios and usage habits, are setting new challenges and constraints for malware detection software. ...
The popularity of external power banks and slim batteries camouflaged as covers are a sign that smartphone users do need extra power for their devices. ...
doi:10.1007/978-3-319-20550-2_9
fatcat:la2ammv2orc45ijfhkqz3z7nnq
Challenges in securing the interface between the cloud and pervasive systems
2011
2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices ...
In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what ...
license to publish or reproduce the published form of this submission, or allow others to do so, for United States Government purposes. ...
doi:10.1109/percomw.2011.5766850
dblp:conf/percom/Lagesse11
fatcat:ddpfapbtkrdofg2crx2377js64
A Security Perspective on Battery Systems of the Internet of Things
2017
Journal of Hardware and Systems Security
A security analysis is necessary for system manufacturers and users to understand what threats and solutions exist for battery system security. ...
We divide the battery system into the Physical, Battery Management System, and Application layers and use mobile systems and cyber-physical systems as case studies for IoT applications. ...
The battery cells have certain limits (lower and upper voltage/current bounds) and demonstrate specific behavior towards different power requests. ...
doi:10.1007/s41635-017-0007-0
dblp:journals/jhss/LopezVNYBF17
fatcat:5d3jv5eirndihhhlwihubqhzxe
Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies
2021
Journal of Information Security and Cybercrimes Research
The paper presents mobile malware types and in-depth infection strategies malware deploys to infect mobile devices. ...
Finally, we identify the need for a critical analysis of mobile malware frameworks to identify their weaknesses and strengths to develop a more robust, accurate, and scalable tool from an Android detection ...
The study by Chen et al [38] asserted that malware infections and threats on mobile devices are increasingly spreading to affect other smart devices such as smart cities, smart TVs, smartwatches, cloud-based ...
doi:10.26735/krvi8434
fatcat:ukj62xubvzgdhf42fzgglv4zea
Energy Harvesting towards Self-Powered IoT Devices
2020
Energies
Thus, from a practical point of view, such devices are composed of power-efficient storage, scalable, and lightweight nodes needing power and batteries to operate. ...
The internet of things (IoT) manages a large infrastructure of web-enabled smart devices, small devices that use embedded systems, such as processors, sensors, and communication hardware to collect, send ...
exhaustion No Anti-malware No Intrusion detection system [159-166] DoS Jamming Interruption of service No Anti-jamming solutions Degradation of throughput [167-169] DoS Stealthy Collision Energy depletion ...
doi:10.3390/en13215528
fatcat:24i5qw75gnccpno7gcrx55mmeq
Demanding Requirement of Security for Wireless Mobile Devices: A Survey
2014
Research Journal of Applied Sciences Engineering and Technology
Specifically Android Smartphone which can access the Internet may now signify an ultimate option for malware authors. ...
So in this study, we present an organized and widespread overview of the research on the security elucidation for wireless portable devices. ...
to its owner's location or can exploit power exhaustive in GPS or Bluetooth enabled mobile phones to drain the battery. ...
doi:10.19026/rjaset.8.1244
fatcat:hu2ehdgmgzharhi3fzpenmmf5e
Android Security: A Survey of Issues, Malware Penetration, and Defenses
2015
IEEE Communications Surveys and Tutorials
STEALTH MALWARE TECHNIQUES Android works under the condition of low processing power and limited memory as well as battery availability. ...
For example, anti-malware apps have limited scanning and/or monitoring capability for other apps or file-system in the device. ...
doi:10.1109/comst.2014.2386139
fatcat:dkweaqhfo5dtpnii7xpgui4pgu
Searching Grade Scheme and Malware Recognition Within Google Play Application
2019
International Journal of Scientific Research in Science and Technology
To make out malware, preceding work has paying attention on app executable and acquiescence analysis. It will show that 75 percent of the acknowledged malware apps engage in hunt rank fraud. ...
FairPlay achieves over 95 percent accuracy in classify gold regular datasets of malware, counterfeit and legitimate apps. ...
.,
anti-virtual contraption and anti-debugger) and thus
malicious activities force not is hidden beginning
detection. ...
doi:10.32628/ijsrst196177
fatcat:caivp56bkrealhcmc6isqrlkiy
« Previous
Showing results 1 — 15 out of 414 results