Title | ||
---|---|---|
A Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Services. |
Abstract | ||
---|---|---|
A method to detect Trojan horses in messaging and Bluetooth in mobile phones by means of monitoring the events produced by the infections is presented in this paper. The structure of the detection approach is split into two modules: the first is the Monitoring module which controls connection requests and sent/received files, and the second is the Graphical User module which shows messages and, under suspicious situations, reports the user about a possible malware. Prototypes have been implemented on different mobile operating systems to test its feasibility on real cellphone malware. Experimental results are shown to be promising since this approach effectively detects various known malware. |
Year | DOI | Venue |
---|---|---|
2011 | 10.3837/tiis.2011.08.006 | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS |
Keywords | Field | DocType |
Security,mobile devices,mobile malware,spyware | Mobile malware,Mobile search,Computer science,Computer network,Trojan horse,Mobile device,Mobile Web,Malware,Trojan,Bluetooth,Embedded system | Journal |
Volume | Issue | ISSN |
5 | 8 | 1976-7277 |
Citations | PageRank | References |
3 | 1.09 | 7 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Juan Antonio Ortega Redondo | 1 | 208 | 29.56 |
Daniel Fuentes | 2 | 53 | 7.30 |
Juan Antonio Álvarez | 3 | 26 | 5.29 |
Luis Gonzalez-Abril | 4 | 102 | 20.14 |
Francisco Velasco | 5 | 20 | 3.41 |