SAM: a secure anti-malware framework for the smartphone operating systems

MS Iqbal, M Zulkernine - 2016 IEEE Wireless Communications …, 2016 - ieeexplore.ieee.org
Smartphones have become an integral part of our daily life. Businesses now offer services
through smartphones. Users also store sensitive personal information on their smartphones …

Prevention mechanism for prohibiting SMS malware attack on android smartphone

C Kotkar, P Game - 2015 annual IEEE India conference …, 2015 - ieeexplore.ieee.org
Nowadays, use of android smartphone is increasing tremendously, because of their
attractive features and capabilities. People store their confidential information on …

Smartphone security evaluation the malware attack case

A Mylonas, S Dritsas, B Tsoumas… - Proceedings of the …, 2011 - ieeexplore.ieee.org
The adoption of smartphones, devices transforming from simple communication devices to
'smart'and multipurpose devices, is constantly increasing. Amongst the main reasons are …

Designing a comprehensive security framework for smartphones and mobile devices

N Jafari, A Alsadoon, CP Withana… - American Journal …, 2016 - researchoutput.csu.edu.au
This work investigates issues and challenges of cyber security, specifically malware
targeting mobile devices. Recent advances in technology have provided high CPU power …

Mobile malware and smart device security: Trends, challenges and solutions

A Arabo, B Pranggono - 2013 19th international conference on …, 2013 - ieeexplore.ieee.org
This work is part of the research to study trends and challenges of cyber security to smart
devices in smart homes. We have seen the development and demand for seamless …

Smartphone security: Overview of security software solutions

D Fischer, B Markscheffel… - … Conference for Internet …, 2013 - ieeexplore.ieee.org
The market of security software solutions for smartphones has grown considerably in the last
few years. A wide range of products is available. The objective of our work is to develop an …

Smartphone: Security and privacy protection

XT Li, S Ren, W Cheng, LS Xiang, XY Liu - … SWS 2013, Vina del Mar, Chile …, 2014 - Springer
Current smartphone operating systems are capable of running applications written by third
party developers. And this capability has raised concerns about the threat that smartphones …

Security steps for smartphone users

H Pieterse, MS Olivier - 2013 Information Security for South …, 2013 - ieeexplore.ieee.org
Smart phones are an important asset for people living in the 21st century. With functionality
similar to computers, smart phones have become all-in-one portable devices providing …

Third line of defense strategy to fight against sms-based malware in android smartphones

A Derhab, K Saleem, A Youssef - 2014 International Wireless …, 2014 - ieeexplore.ieee.org
In this paper, we inspire from two analogies: the warfare kill zone and the airport check-in
system, to design and deploy a new line in the defense-in-depth strategy, called the third …

Smartphone applications security: Survey of new vectors and solutions

A Eshmawi, S Nair - 2013 ACS international conference on …, 2013 - ieeexplore.ieee.org
The use of smartphones is becoming more pervasive with the launch of applications that can
handle every aspect of life. These applications range from simple calender management to …