A mobile phone malicious software detection model with behavior checker
There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attack...
| Main Authors: | , |
|---|---|
| Format: | Article |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2305/ |
| _version_ | 1848790020531421184 |
|---|---|
| author | Yap, , TS Ewe, , HT |
| author_facet | Yap, , TS Ewe, , HT |
| author_sort | Yap, , TS |
| building | MMU Institutional Repository |
| collection | Online Access |
| description | There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented, |
| first_indexed | 2025-11-14T18:05:58Z |
| format | Article |
| id | mmu-2305 |
| institution | Multimedia University |
| institution_category | Local University |
| last_indexed | 2025-11-14T18:05:58Z |
| publishDate | 2005 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | mmu-23052011-08-24T05:43:35Z http://shdl.mmu.edu.my/2305/ A mobile phone malicious software detection model with behavior checker Yap, , TS Ewe, , HT QA75.5-76.95 Electronic computers. Computer science There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented, 2005 Article NonPeerReviewed Yap, , TS and Ewe, , HT (2005) A mobile phone malicious software detection model with behavior checker. WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET -RELATED SOCIAL ISSUES - HSI 2005, 3597 . pp. 57-65. ISSN 0302-9743 |
| spellingShingle | QA75.5-76.95 Electronic computers. Computer science Yap, , TS Ewe, , HT A mobile phone malicious software detection model with behavior checker |
| title | A mobile phone malicious software detection model with behavior checker |
| title_full | A mobile phone malicious software detection model with behavior checker |
| title_fullStr | A mobile phone malicious software detection model with behavior checker |
| title_full_unstemmed | A mobile phone malicious software detection model with behavior checker |
| title_short | A mobile phone malicious software detection model with behavior checker |
| title_sort | mobile phone malicious software detection model with behavior checker |
| topic | QA75.5-76.95 Electronic computers. Computer science |
| url | http://shdl.mmu.edu.my/2305/ |