{"title":"基于功率的智能手机恶意代码检测技术","authors":"Bryan Dixon, Shivakant Mishra, Jean-Luc Pepin","doi":"10.1109/NCA.2014.45","DOIUrl":null,"url":null,"abstract":"In recent years there have been a growing number of viruses, root kits, and malware designed to gain access to system resources and information stored on smartphones. This paper examines the effectiveness of two smartphone-specific techniques for detecting malicious code behavior based on individual power consumption profiles based on time and location. Prototypes for each of the techniques were developed for use with Google's Android platform and were each evaluated over periods of six months or more involving several real-world users. This paper describes the design and implementation of each of these prototypes as well as the evaluation of their results.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Power Based Malicious Code Detection Techniques for Smartphones\",\"authors\":\"Bryan Dixon, Shivakant Mishra, Jean-Luc Pepin\",\"doi\":\"10.1109/NCA.2014.45\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years there have been a growing number of viruses, root kits, and malware designed to gain access to system resources and information stored on smartphones. This paper examines the effectiveness of two smartphone-specific techniques for detecting malicious code behavior based on individual power consumption profiles based on time and location. Prototypes for each of the techniques were developed for use with Google's Android platform and were each evaluated over periods of six months or more involving several real-world users. This paper describes the design and implementation of each of these prototypes as well as the evaluation of their results.\",\"PeriodicalId\":206739,\"journal\":{\"name\":\"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\",\"volume\":\"80 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-08-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCA.2014.45\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCA.2014.45","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Power Based Malicious Code Detection Techniques for Smartphones
In recent years there have been a growing number of viruses, root kits, and malware designed to gain access to system resources and information stored on smartphones. This paper examines the effectiveness of two smartphone-specific techniques for detecting malicious code behavior based on individual power consumption profiles based on time and location. Prototypes for each of the techniques were developed for use with Google's Android platform and were each evaluated over periods of six months or more involving several real-world users. This paper describes the design and implementation of each of these prototypes as well as the evaluation of their results.