About malicious software in smartphones

@article{Tyssy2006AboutMS,
  title={About malicious software in smartphones},
  author={Sampo T{\"o}yssy and Marko Helenius},
  journal={Journal in Computer Virology},
  year={2006},
  volume={2},
  pages={109-119}
}
Phones with some of the capabilities of modern computers also have the same kind of drawbacks. These phones are commonly referred to as smartphones. They have both phone and personal digital assistant (PDA) functionality. Typical to these devices is to have a wide selection of different connectivity options from general packet radio service (GPRS) data transfer to multi media messages (MMS) and wireless local area network (WLAN) capabilities. They also have standardized operating systems, which… Expand
90 Citations
In-memory credentials robbery on android phones
  • 11
A Survey on Security for Mobile Devices
  • 483
  • PDF
Behavioral Detection of Malicious Programs on Mobile Handsets
  • PDF
Hashing Smartphone Serial Numbers: An ASLR Approach to Preventing Malware Attacks
Cross-Platform Evaluation of Mobile App Hardening
  • 1
Rootkits on Smart Phones: Attacks and Implications
  • 1
  • PDF
Detection of Smartphone Malware
  • 20
  • Highly Influenced
  • PDF
Mobile Device Security
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 35 REFERENCES
Repairing the Bluetooth Pairing Protocol
  • 22
Cracking the Bluetooth PIN
  • 217
  • PDF
OSs Battle in the Smart-Phone Market
  • 32
  • Highly Influential
Modeling epidemic spreading in mobile environments
  • 150
  • Highly Influential
  • PDF
Directed-graph epidemiological models of computer viruses
  • J. Kephart, S. R. White
  • Computer Science
  • Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy
  • 1991
  • 806
  • PDF
CardTrap
  • http://www.f-secure.com/v-descs/cardtrap\_a.shtml (20.6.2006)
  • 2006
CardTrap
  • http://www.f-secure.com/v-descs/cardtrap\_a.shtml (20.6.2006)
  • 2006
FlexiSpy
  • http://www.f-secure.com/v-descs/flexispy\_a.shtml (20.6.2006)
  • 2006
RedBrowser
  • http://www.f-secure.com/v-descs/redbrowser\_a.shtml (20.6.2006)
  • 2006
Helsingin Sanomat
  • http://www.helsinginsanomat.fi/ (28.6.2006)
  • 2006
...
1
2
3
4
...