References
- Physorg, "Five Billion People to Use Mobile Phones in 2010: UN," 2010. http://www.physorg.com/news185467439.html.
- IBM X Force Threat Reports, "IBM Internet Security Systems X-Force, Trend and Risk Report," 2009. http://www-935.ibm.com/services/us/iss/xforce/trendreports.
- Neo-Call. http://www.neo-call.com.
- C. Fleizach, M. Liljenstam, P. Johansson, G.M. Voelker, A. Mehes, "Can You Infect Me Now?: Malware Propagation in Mobile Phone Networks," in Proc. of the 2007 ACM Workshop on Recurring Malcode (WORM '07), pp. 61-68, Nov. 2007.
- Cabir. http://www.f-secure.com/v-descs/cabir.shtml
- Commwarrior. http://www.f-secure.com/v-descs/commwarrior.shtml
- G. Zyba, G.M. Voelker, M. Liljenstam, A. Méhes, P. Johansson, "Defending Mobile Phones from Proximity Malware," in Proc. of INFOCOM 2009, pp. 1503-1511, Apr. 2009.
- J. Cheng, H.Y. Wong, H. Yang, S. Lu, "SmartSiren: Virus Detection and Alert for Smartphones," in Proc. of the 2007 International Conference on Mobile Systems, Applications, and Services (Mobysis '07), pp. 258-271, June 2007.
- G. Yan, S. Eidenbenz, E. Galli, "SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection," Lecture Notes in Computer Science, vol. 5758, pp. 202-223, 2009.
- A.D. Schmidt, F. Peters, F. Lamour, S. Albayrak, "Monitoring Smartphones for Anomaly Detection," in Proc. of Mobilware 2008, pp. 92-96, June 2007.
- A. Bose, K. Shin, "On Mobile Viruses Exploiting Messaging and Bluetooth Services," in Proc. of International Conference on Security and Privacy in Communication Networks (SecureComm'06), pp. 1-10. May 2007.
- A. Bose, X. Hu, K.G. Shin, T. Park, "Behavioral Detection of Malware on Mobile Handsets," in Proc. of the 6th International Conference on Mobile Systems, Applications, and Services, pp. 225-238. June 2008.
- L. Xie, X. Zhang, J. Seifert, S. Zhu, "pBMDS: a Behavior-based Malware Detection System for Cellphone Devices," in Proc. of the WISEC 2010. pp. 37-48, Mar. 2010.
- S. Zahid, M. Shahzad, S.A. Khayam, M. Farooq, "Keystroke-Based User Identification on Smart Phones," in Proc. of the RAID 2009. pp. 224-243, Sep. 2009.
- H. Kim, J. Smith, K.G. Shin, "Detecting Energy-Greedy Anomalies and Mobile Malware Variants," in Proc. of the 5th International Conference on Mobile Systems, Applications, and Services, pp. 17-20, June 2008.
- L. Liu, G. Yan, X. Zhang, S. Chen, "VirusMeter: Preventing Your Cellphone from Spies," in Proc. of the RAID 2009, pp. 244-264, Sep. 2009,
- Open Handset Alliance Project Android. http://www.android.com
- Apple iPhone. http://www.apple.com/iphone
- AirScanner Mobile Software. http://www.airscanner.com
- BullGuard Antivirus. http://www.spyphone.es
- RedFiveLabs. http://www.redfivelabs.com
- Spyphone. http://www.spyphone.es
- S60 5th Edition C++ Developer's Library v2.1. http://library.forum.nokia.com
- Cabir code. http://www.offensivecomputing.net/?q=node/773