Mobile phones as computing devices: the viruses are coming!

@article{Dagon2004MobilePA,
  title={Mobile phones as computing devices: the viruses are coming!},
  author={D. Dagon and T. Martin and T. Starner},
  journal={IEEE Pervasive Computing},
  year={2004},
  volume={3},
  pages={11-15}
}
Understanding existing threats against mobile phones helps us better protect our information and prepare for future dangers. Mobile phones have evolved from their roots as analog walkie-talkies to full-scale Internet-enabled computers. Today, mobile phone handsets are arguably the dominant computer form factor consumers purchase. But having such powerful networked computers leads to a new class of malware: viruses, worms, and trojans specifically designed for the mobile environment. Merely… Expand
210 Citations
A Review of Malicious Code Detection Techniques for Mobile Devices
  • 5
  • Highly Influenced
  • PDF
Malicious Software in Mobile Devices
  • 10
Rootkits on Smart Phones: Attacks and Implications
  • 1
  • PDF
Behaviour Based Anomaly Detection for Smartphones Using Machine Learning Algorithm
  • 4
  • PDF
Chapter I Malicious Software in Mobile Devices
  • 1
  • PDF
Can you infect me now?: malware propagation in mobile phone networks
  • 129
  • PDF
Identification of Distributed Malware
  • 1
A Mobile Phone Malicious Software Detection Model with Behavior Checker
  • 27
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 11 REFERENCES
Access for sale: a new class of worm
  • 34
Denial-of-service attacks on battery-powered mobile computers
  • 205
  • PDF
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
  • 1,443
  • PDF
Denial of service attacks at the MAC layer in wireless ad hoc networks
  • 265
  • PDF
The quest for security in mobile ad hoc networks
  • 968
  • PDF
Attack Analysis and Detection for Ad Hoc Routing Protocols
  • 185
  • PDF
A defense-centric taxonomy based on attack manifestations
  • 88
  • PDF
Dynamic Source Routing in Ad Hoc Wireless Networks
  • 9,830
  • PDF
Access for Sale
  • Proc. 2003 ACM Workshop Rapid Malcode (WORM 03), ACM SIGSAC
  • 2003
...
1
2
...