A survey on security for mobile devices

M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …

Mobile security catching up? revealing the nuts and bolts of the security of mobile devices

M Becher, FC Freiling, J Hoffmann… - … IEEE Symposium on …, 2011 - ieeexplore.ieee.org
We are currently moving from the Internet society to a mobile society where more and more
access to information is done by previously dumb phones. For example, the number of …

Practical attacks against privacy and availability in 4G/LTE mobile communication systems

A Shaik, R Borgaonkar, N Asokan, V Niemi… - arXiv preprint arXiv …, 2015 - arxiv.org
Mobile communication systems now constitute an essential part of life throughout the world.
Fourth generation" Long Term Evolution"(LTE) mobile communication networks are being …

Identity and content authentication for phone calls

PG Traynor, BG Reaves, LE Blue, L Vargas… - US Patent …, 2020 - Google Patents
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …

[图书][B] Germ Cell Tumor

A Matin - 2012 - books.google.com
The book aims to provide an overview of current knowledge regarding germ cell tumors. It
deals with the clinical presentations, treatment modalities, the biology and genetics of germ …

Touching the untouchables: Dynamic security analysis of the LTE control plane

H Kim, J Lee, E Lee, Y Kim - 2019 IEEE Symposium on Security …, 2019 - ieeexplore.ieee.org
This paper presents our extensive investigation of the security aspects of control plane
procedures based on dynamic testing of the control components in operational Long Term …

Behavioral detection of malware on mobile handsets

A Bose, X Hu, KG Shin, T Park - … of the 6th international conference on …, 2008 - dl.acm.org
A novel behavioral detection framework is proposed to detect mobile worms, viruses and
Trojans, instead of the signature-based solutions currently available for use in mobile …

Detecting energy-greedy anomalies and mobile malware variants

H Kim, J Smith, KG Shin - … of the 6th international conference on Mobile …, 2008 - dl.acm.org
Mobile users of computation and communication services have been rapidly adopting
battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work …

On security research towards future mobile network generations

D Rupprecht, A Dabrowski, T Holz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …

Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications

B Reaves, J Bowers, N Scaife, A Bates… - ACM Transactions on …, 2017 - dl.acm.org
Mobile money, also known as branchless banking, leverages ubiquitous cellular networks to
bring much-needed financial services to the unbanked in the developing world. These …