Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 983901, 12 pages
http://dx.doi.org/10.1155/2014/983901
Research Article

An Analysis of Security System for Intrusion in Smartphone Environment

1Department of Ubiquitous IT, Graduate School of Dongseo University, Sasang-Gu, Busan 617-716, Republic of Korea
2Division of Computer and Engineering Dongseo University, Sasang-Gu, Busan 617-716, Republic of Korea

Received 14 March 2014; Accepted 4 June 2014; Published 5 August 2014

Academic Editor: Fei Yu

Copyright © 2014 Maya Louk et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Juniper research, Press Release: More than 90% of Smartphones Remain Unprotected from Malware and Attacks, Juniper Research Finds, 2014, http://www.juniperresearch.com/viewpressrelease.php?pr=404.
  2. IDC Worldwide Quarterly Mobile Phone Tracker, Android and iOS Combine for 92.3% of All Smartphone Operating System Shipments in the First Quarter While Windows Phone Leapfrogs BlackBerry, According to IDC, 2013, http://www.idc.com/getdoc.jsp?containerId=prUS24108913.
  3. M. Denis, “Mobile Malware Evolution: Part 6,” 2014, http://www.securelist.com/en/analysis/204792283/Mobile_Malware_Evolution_Part_6?print_mode=1.
  4. Cloud Security Alliance, Top Threats to Mobile Computing, Cloud Security Alliance, 2012.
  5. V. B. Oliveira, Z. Abdelouahab, D. Lopes, M. H. Santos, and V. P. Fernandes, “Honeypotlabsac: a virtual honeypot framework for android,” International Journal of Computer Networks & Communications, vol. 5, no. 4, p. 159, 2013. View at Google Scholar
  6. W. Enck, M. Ongtang, and P. McDaniel, “Understanding android security,” IEEE Security and Privacy, vol. 7, no. 1, pp. 50–57, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, “A study of android application security,” in Proceedings of the 20th USENIX Security Symposium, USENIX Association, August 2011.
  8. A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer, “Google android: a comprehensive security assessment,” IEEE Security and Privacy, vol. 8, no. 2, pp. 35–44, 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel, “Semantically rich application-centric security in android,” in Proceedings of the 25th Annual Computer Conference Security Applications (ACSAC '09), pp. 340–349, IEEE Computer Society, Los Alamitos, CA, USA, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. G. D. Bai, L. Gu, T. Feng, Y. Guo, and X. Q. Chen, “Context-aware usage control for android,” in Security and Privacy in Communication Networks, vol. 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 326–343, Springer, Berlin, Germany, 2010. View at Google Scholar
  11. I. Burguera, U. Zurutuza, and S. NadjmTehrani, “Crowdroid: behavior-based malware detection system for android,” in Proceedings of the ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM ’11), Chicago, Ill, USA, 2011.
  12. W. Enck, P. Gilbert, B.-G. Chun et al., “TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones,” in Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI '10), pp. 1–6, USENIX Association, Berkeley, Calif, USA, 2010.
  13. K. Lee, R. S. Tolentino, G.-C. Park, and Y.-T. Kim, “A study on architecture of malicious code blocking scheme with white list in smartphone environment,” in Communication and Networking, vol. 119 of Communications in Computer and Information Science, pp. 155–163, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar
  14. C. Marforio, A. Francillon, and S. Capkun, “Application collusion attack on the permission-based security model and its implications for modern smartphone systems,” Tech. Rep., Department of Computer Science, ETH Zurich, Zürich, Switzerland, 2011. View at Google Scholar
  15. A. Amamra, C. Talhi, and J. Robert, “Smartphone malware detection: from a survey towards taxonomy,” in Proceeding of the 7th International Conference on Malicious and Unwanted Software (Malware '12), pp. 79–86, Fajardo, Puerto Rico, USA, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. M. Zhao, T. Zhang, F. Ge, and Z. Yuan, “Robotdroid: a lightweight malware detection framework on smartphones,” Journal of Networks, vol. 7, no. 4, pp. 715–722, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. I. You and K. Yim, “Malware obfuscation techniques: a brief survey,” in Proceedings of the 5th International Conference on Broadband Wireless Computing, Communication and Applications (BWCCA '10), pp. 297–300, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. V. Manjunath, “Reverse Engineering of Malware on Android,” SANS Institute InfoSec Reading Room, 2011.
  19. T. Vennon, “Android malware. A study of known and potential malware threats,” SMobile Global Threat Centre, 2010.
  20. A. Schmidt, H. Schmidt, L. Batyuk et al., “Smartphone malware evolution revisited: android next target?” in Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE '09), pp. 1–7, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  21. A. Mujumdar, G. Masiwal, and B. B. Meshram, “Analysis of signature-based and behavior-based anti-malware approaches,” International Journal of Advanced Research in Computer Engineering and Technology, vol. 2, no. 6, pp. 2037–2039, 2013. View at Google Scholar
  22. J. Borello and L. Mé, “Code obfuscation techniques for metamorphic viruses,” Journal in Computer Virology, vol. 4, no. 3, pp. 211–220, 2008. View at Publisher · View at Google Scholar · View at Scopus