Mobile users of computation and communication services have been rapidly adopting battery-powered mobile hand-helds, such as PocketPCs and SmartPhones, for their work. However, the limited battery-lifetime of these devices re-stricts their portability and applicability, and this weak-ness can be exacerbated by mobile malware targeting de-pletion of battery energy. Such malware are usually diffi-cult to detect and prevent, and frequent outbreaks of new malware variants also reduce the effectiveness of commonly-seen signature-based detection. To alleviate these prob-lems, we propose a power-aware malware-detection frame-work that monitors, detects, and analyzes previously un-known energy-depletion threats. The framework is com-posed of (1) a ...
Mobile malware are malicious programs that target mobile devices. They are an increasing problem, as...
The advent of pervasive ubiquitous computing and advancement of wireless\ud communication technologi...
Android malware is becoming very effective in evading detection techniques, and traditional malware ...
Abstract—Smartphones and related mobile end-user devices rep-resent key components of mobile computi...
In recent years there has been a growing number of viruses, rootkits, and malware designed to gain a...
Abstract. Battery technology seems unable to keep up with the rapid evolution of smartphones and the...
Many security problems in smartphones and other smart devices are ap-proached from an anomaly detect...
In order to solve the problem that Android platform’s sand-box mechanism prevents security protectio...
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaust...
The increasing adoption of mobile devices as the preferred tool to access the Internet imposes to de...
Smart phones are increasingly being equipped with operating systems that compare in complexity with...
This paper investigates the feasibility of constructing power-consumption-based sensors for the iden...
The threat of malware on mobile devices is gaining attention recently. It is important to provide se...
Smartphones have become the most preferred computing device for both personal and business use. Dif...
The advent of pervasive ubiquitous computing and advancement of wireless communication technologies ...
Mobile malware are malicious programs that target mobile devices. They are an increasing problem, as...
The advent of pervasive ubiquitous computing and advancement of wireless\ud communication technologi...
Android malware is becoming very effective in evading detection techniques, and traditional malware ...
Abstract—Smartphones and related mobile end-user devices rep-resent key components of mobile computi...
In recent years there has been a growing number of viruses, rootkits, and malware designed to gain a...
Abstract. Battery technology seems unable to keep up with the rapid evolution of smartphones and the...
Many security problems in smartphones and other smart devices are ap-proached from an anomaly detect...
In order to solve the problem that Android platform’s sand-box mechanism prevents security protectio...
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaust...
The increasing adoption of mobile devices as the preferred tool to access the Internet imposes to de...
Smart phones are increasingly being equipped with operating systems that compare in complexity with...
This paper investigates the feasibility of constructing power-consumption-based sensors for the iden...
The threat of malware on mobile devices is gaining attention recently. It is important to provide se...
Smartphones have become the most preferred computing device for both personal and business use. Dif...
The advent of pervasive ubiquitous computing and advancement of wireless communication technologies ...
Mobile malware are malicious programs that target mobile devices. They are an increasing problem, as...
The advent of pervasive ubiquitous computing and advancement of wireless\ud communication technologi...
Android malware is becoming very effective in evading detection techniques, and traditional malware ...