Mostrar el registro sencillo del ítem

Ponencia

dc.creatorFuentes, Danieles
dc.creatorÁlvarez García, Juan Antonioes
dc.creatorOrtega Ramírez, Juan Antonioes
dc.creatorGonzález Abril, Luises
dc.creatorVelasco Morente, Franciscoes
dc.date.accessioned2023-02-17T11:46:21Z
dc.date.available2023-02-17T11:46:21Z
dc.date.issued2010-05
dc.identifier.citationFuentes, D., Álvarez García, J.A., Ortega Ramírez, J.A., González Abril, L. y Velasco Morente, F. (2010). Event-Based Method for Detecting Trojan Horses in Mobile Devices. En MobiSec 2010: Second International ICST Conference, Security and Privacy in Mobile Information and Communication Systems (153-162), Catania (Sicilia, Italia): Springer Link.
dc.identifier.isbn978-3-642-17501-5 (impreso)es
dc.identifier.isbn978-3-642-17502-2 (online)es
dc.identifier.urihttps://hdl.handle.net/11441/142771
dc.description.abstractMobile phones and wireless technology and its constant evolution have, in the last years, revolutionized the way in which we communicate and work. However, one of the main barriers encounter in the use of these technologies is data security. Trojan horses are dangerous software to attack phones, PDAs and Smartphones. New versions are created everyday to attack the functionality, theft the stored information and propagate themselves. In this paper, we present a new real-time method to detect Trojan horses in mobile devices. We study the events in the device to detect programs which can be suspected to be Trojan horses. By doing so, we can detect not only the known Trojan horses with more accuracy, but also detect new trojans. Practical experiences on different devices have been carried out and results show the effectiveness of the method.es
dc.description.sponsorshipMinisterio de Ciencia e Innovación TIN2009-14378-C02-01es
dc.formatapplication/pdfes
dc.format.extent10es
dc.language.isoenges
dc.publisherSpringer Linkes
dc.relation.ispartofMobiSec 2010: Second International ICST Conference, Security and Privacy in Mobile Information and Communication Systems (2010), pp. 153-162.
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectTrojan horseses
dc.subjectmobile deviceses
dc.subjectinfectiones
dc.subjectpropagationes
dc.titleEvent-Based Method for Detecting Trojan Horses in Mobile Deviceses
dc.typeinfo:eu-repo/semantics/conferenceObjectes
dcterms.identifierhttps://ror.org/03yxnpp24
dc.type.versioninfo:eu-repo/semantics/submittedVersiones
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.contributor.affiliationUniversidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticoses
dc.contributor.affiliationUniversidad de Sevilla. Departamento de Economía Aplicada Ies
dc.relation.projectIDTIN2009-14378-C02-01es
dc.relation.publisherversionhttps://link.springer.com/chapter/10.1007/978-3-642-17502-2_13es
dc.identifier.doi10.1007/978-3-642-17502-2_13es
dc.publication.initialPage153es
dc.publication.endPage162es
dc.eventtitleMobiSec 2010: Second International ICST Conference, Security and Privacy in Mobile Information and Communication Systemses
dc.eventinstitutionCatania (Sicilia, Italia)es
dc.relation.publicationplaceBerlines
dc.contributor.funderMinisterio de Ciencia e Innovación (MICIN). Españaes

FicherosTamañoFormatoVerDescripción
Event-Based Method for Detecting ...158.9KbIcon   [PDF] Ver/Abrir  

Este registro aparece en las siguientes colecciones

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como: Attribution-NonCommercial-NoDerivatives 4.0 Internacional