期刊文献+

智能手机恶意代码防范技术综述 被引量:1

Summary of defense technology against malicious code on smart phone
在线阅读 下载PDF
导出
摘要 随着智能手机的普及,手机恶意代码也接踵而至。针对手机恶意代码的防范,国内外已经开展过一些研究。首先通过对比手机与PC机的不同应用背景来说明手机端恶意代码的特点,随后针对恶意代码的传播途径与攻击目标进行各种现有防范技术的详细介绍,最后对智能手机恶意代码防范的发展趋势做出了展望。 The popularization of the smart phone comes with malicious code based on the smart phone. Researches concerned with the smart phone malicious code have been made both at home and abroad. This paper first illustrates the characteristics of the smart phone malicious code by comparing the different application background between the smart phone and personal computer. Then the current defense technology based on the spread mode and attack target of the smart phone malicious code, and finally makes some assumptions of the future development of the defense against smart phone malicious code.
出处 《信息技术》 2009年第10期162-167,共6页 Information Technology
关键词 智能手机 恶意代码 防范 终端 网关 smart phone ,nalicious code defense terminal gateway
  • 相关文献

参考文献11

  • 1刘小林,刘克胜.Windows Mobile手机恶意软件的原理分析及防护措施研究[J].网络安全技术与应用,2008(9):41-43. 被引量:3
  • 2Chuanxiong Guo Helen J,Wang Wenwu Zhu. Smart-Phone Attacks anti Defenses[M]//Proc. ACM HotNets 2004.
  • 3XIA Wei, LI Zhao-hui, CHEN Zeng-qiang, et al. The Influence of Smart Phone's Mobility on Bluetooth Worm Protmgation[ C ]. The 3rd IEEE International Conference on Wireless Communications, Networ- king and Mobile Computing (WiCom/2007), September 21 -23 2007.
  • 4Chris Fleizaeh, Michael Liljenstam, Per Johansson, Geoffrey M. Voelker, and Andras Mehes. Can You Infect Me Now? Malware Propagation in Mobile Phone Networks[J]//WORM'07 Proceedings of the 2007 ACM workshop on Recurring malcode, 2007 : 61 - 68.
  • 5Radmilo Racic, Denys Ma, Hao Chen. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery[C]. Second International Conference on Security and Privacy in Communication Networks. Baltimore,2006(8).
  • 6Edina Arslanagic, Faculty of Engineering and Science. Personal firewall in mobile phone[ D]. Agder Unibersity, 2004(5 ).
  • 7Teck Sung Yap, Hong Tat Ewe. Faculty. of Information Technology, Multimedia University, Malaysia A Mobile Phone Malicious Software Detection Model with Behavior Cheeker[J]. Lecture Notes in Computer Science 2005,3597 : 57 - 65.
  • 8陈雅娴,袁津生,郭敏哲.基于行为异常的Symbian蠕虫病毒检测方法[J].计算机系统应用,2008,17(11):49-52. 被引量:5
  • 9李闻,戴英侠,连一峰,冯萍慧,鲍旭华.基于异常诊断的代码注入攻击自动分析和响应系统[J].软件学报,2008,19(6):1519-1532. 被引量:5
  • 10孙其博.手机病毒与移动通信安全[J].电信网技术,2008(7):1-5. 被引量:11

二级参考文献37

  • 1李志,王延巍,朱林.手机病毒的现状与未来[J].电信技术,2006(3):87-90. 被引量:16
  • 2[7]Cheng J,Starsky H.Y.Wong,Hao Yang and Songwu Lu.SmartSiren:Virus Detection and Alert for Smartphones.Dept.of Computer Science,UCLA,4732 Boelter Hall,Los Angeles,CA 90025 1 IBM T.J.Watson Research,19 Skyline Drive,Hawthorne,NY 10532 2.
  • 3[3]Eskin E.Anomaly Detection over Noisy Data Using Learned Probabilit.Distributions.Proceedings of the 17th International Confereneson Machine Learning (ICML2000),2000.237-243.
  • 4[4]Traynor,P.Enek,W.McDaniel,P.and Porta.T.L.Mitigating Attacks on Open Functionality in SMS-Capablecellular Networks.In ACM MobiCom 06.
  • 5Siang B K. SMS Gateway Interface Remote Monitoring and Controlling via GSM SMS[C]//Proc. of the 4th National Conference on Telecommunication Technology. [S. l.]: IEEE Press, 2003: 84-87.
  • 6Peersman G, Cvetkovic S. The Global System for Mobile Communications Short Message Service[J]. Personal Communications, 2000, 7(3): 15-23.
  • 7Grossman D, Hicks M, Jim T, Morristee G. Cyclone: A type-safe dialect of C. C/C++ Users Journal, 2005,23(1):112-139.
  • 8Neeula G, MePeak S, Weimer W. CCured: Type-safe retrofitting of legacy code. In: John L, ed. Proe. of the 29th ACM SIGPLAN- SIGACT Syrup. on Principles of Programming Languages. ACM, 2002. 128-139.
  • 9Larus JR, Ball T, Das M, DeLine R. Righting software. IEEE Software, 2004,21(3):92-100.
  • 10Chen H, Wagner D. MOPS: An infrastructure for examining security properties of software. In: Atluri V, ed. Proc. of the ACM Computer and Communications Security (CCS) 2002 Conf. ACM, 2002.18-22.

共引文献24

同被引文献6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部