A mobile phone malicious software detection model with behavior checker

There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attack...

Full description

Bibliographic Details
Main Authors: Yap, , TS, Ewe, , HT
Format: Article
Published: 2005
Subjects:
Online Access:http://shdl.mmu.edu.my/2305/
_version_ 1848790020531421184
author Yap, , TS
Ewe, , HT
author_facet Yap, , TS
Ewe, , HT
author_sort Yap, , TS
building MMU Institutional Repository
collection Online Access
description There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented,
first_indexed 2025-11-14T18:05:58Z
format Article
id mmu-2305
institution Multimedia University
institution_category Local University
last_indexed 2025-11-14T18:05:58Z
publishDate 2005
recordtype eprints
repository_type Digital Repository
spelling mmu-23052011-08-24T05:43:35Z http://shdl.mmu.edu.my/2305/ A mobile phone malicious software detection model with behavior checker Yap, , TS Ewe, , HT QA75.5-76.95 Electronic computers. Computer science There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented, 2005 Article NonPeerReviewed Yap, , TS and Ewe, , HT (2005) A mobile phone malicious software detection model with behavior checker. WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET -RELATED SOCIAL ISSUES - HSI 2005, 3597 . pp. 57-65. ISSN 0302-9743
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Yap, , TS
Ewe, , HT
A mobile phone malicious software detection model with behavior checker
title A mobile phone malicious software detection model with behavior checker
title_full A mobile phone malicious software detection model with behavior checker
title_fullStr A mobile phone malicious software detection model with behavior checker
title_full_unstemmed A mobile phone malicious software detection model with behavior checker
title_short A mobile phone malicious software detection model with behavior checker
title_sort mobile phone malicious software detection model with behavior checker
topic QA75.5-76.95 Electronic computers. Computer science
url http://shdl.mmu.edu.my/2305/