참고문헌
- J. Baek and J. Park, "A study of analysis and improvement of security vulnerability in Bluetooth for data transfer", Journal of the Korea Academia-Industrial cooperation Society(JKAIS), Vol. 12, No. 6, pp. 2801-2806, 2011. https://doi.org/10.5762/KAIS.2011.12.6.2801
- K. Shin, U. Park and M. Jun, "A Design of SMS DDoS Detection and Defense Method using Counting Bloom Filter", In Proceedings of the KAIS Fall Conference, Vol. 1, pp. 53-56, 2011.
- H. Yang, "A Study of Security Weaknesses of QR Codes and Its Countermeasures", The journal of the Institute of Internet Broadcasting and Communication (JIIBC), vol. 12, no. 1, pp. 83-89, 2012. https://doi.org/10.7236/JIWIT.2012.12.1.83
- S. Kim, D. Choi and B. An, "Detection and Prevention Method by Analyzing Malignant Code of Malignant Bot", The journal of the Institute of Internet Broadcasting and Communication (JIIBC), Vol. 13, No. 2, pp. 199-207, 2013. https://doi.org/10.7236/JIIBC.2013.13.2.199
- G. Geng, G. Xu, M. Zhang, Y. Guo, G. Yang, and C. Wei. "The design of sms based heterogeneous mobile botnet", Journal of Computers, Vol. 7, No. 1, pp. 235-243, 2012.
- G. Weidman. "Transparent botnet command and control for smartphones over sms", In Proceedings of Shmoocon, 2011.
- C. Mulliner and J. Seifert, "Rise of the ibots: Owning a telco network", In Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software (Malware), pp. 19-20, 2010.
- K. Singh, S. Sangal, N. Jain, P. Traynor, and W. Lee, "Evaluating bluetooth as a medium for botnet command and control", Detection of Intrusions and Malware, and Vulnerability Assessment, Vol. 6201, pp. 61-80, 2010.
- X. Kou and Q. Wen, "Intrusion detection model based on android", Broadband Network and Multimedia Technology (IC-BNMT), pp. 624-628, 2011.
- G. Dini, F. Martinelli, A. Saracino, and D. Sgandurra, "MADAM: A Multi-level Anomaly Detector for Android Malware", In Proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS'12), pp. 240-253, 2012.
- J. Cheng, S.H.Y. Wong, H. Yang, and S. Lu, "SmartSiren: virus detection and alert for smartphones", In Proceedings of the 5th international conference on Mobile systems, applications and services (MobiSys'07), pp. 258-271, 2007.
- G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, "Paranoid Android: versatile protection for smartphones", In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC'10), pp. 347-356, 2010.
- W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel and A. Sheth, "TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones", In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, pp. 1-6, 2010.
- L. Liu, G. Yan, X. Zhang, and S. Chen, "VirusMeter: Preventing Your Cellphone from Spies", In Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID'09), pp. 244-264, 2009.
- Y. Zhou and X.Jiang, "Dissecting Android Malware: Characterization and Evolution", In Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP'12), pp. 95-109, 2012.