dc.creator | Fuentes, Daniel | es |
dc.creator | Álvarez García, Juan Antonio | es |
dc.creator | Ortega Ramírez, Juan Antonio | es |
dc.creator | González Abril, Luis | es |
dc.creator | Velasco Morente, Francisco | es |
dc.date.accessioned | 2023-02-17T11:46:21Z | |
dc.date.available | 2023-02-17T11:46:21Z | |
dc.date.issued | 2010-05 | |
dc.identifier.citation | Fuentes, D., Álvarez García, J.A., Ortega Ramírez, J.A., González Abril, L. y Velasco Morente, F. (2010). Event-Based Method for Detecting Trojan Horses in Mobile Devices. En MobiSec 2010: Second International ICST Conference, Security and Privacy in Mobile Information and Communication Systems (153-162), Catania (Sicilia, Italia): Springer Link. | |
dc.identifier.isbn | 978-3-642-17501-5 (impreso) | es |
dc.identifier.isbn | 978-3-642-17502-2 (online) | es |
dc.identifier.uri | https://hdl.handle.net/11441/142771 | |
dc.description.abstract | Mobile phones and wireless technology and its constant evolution have, in the last years, revolutionized the way in which we communicate and work. However, one of the main barriers encounter in the use of these technologies is data security. Trojan horses are dangerous software to attack phones, PDAs and Smartphones. New versions are created everyday to attack the functionality, theft the stored information and propagate themselves. In this paper, we present a new real-time method to detect Trojan horses in mobile devices. We study the events in the device to detect programs which can be suspected to be Trojan horses. By doing so, we can detect not only the known Trojan horses with more accuracy, but also detect new trojans. Practical experiences on different devices have been carried out and results show the effectiveness of the method. | es |
dc.description.sponsorship | Ministerio de Ciencia e Innovación TIN2009-14378-C02-01 | es |
dc.format | application/pdf | es |
dc.format.extent | 10 | es |
dc.language.iso | eng | es |
dc.publisher | Springer Link | es |
dc.relation.ispartof | MobiSec 2010: Second International ICST Conference, Security and Privacy in Mobile Information and Communication Systems (2010), pp. 153-162. | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | Trojan horses | es |
dc.subject | mobile devices | es |
dc.subject | infection | es |
dc.subject | propagation | es |
dc.title | Event-Based Method for Detecting Trojan Horses in Mobile Devices | es |
dc.type | info:eu-repo/semantics/conferenceObject | es |
dcterms.identifier | https://ror.org/03yxnpp24 | |
dc.type.version | info:eu-repo/semantics/submittedVersion | es |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | es |
dc.contributor.affiliation | Universidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticos | es |
dc.contributor.affiliation | Universidad de Sevilla. Departamento de Economía Aplicada I | es |
dc.relation.projectID | TIN2009-14378-C02-01 | es |
dc.relation.publisherversion | https://link.springer.com/chapter/10.1007/978-3-642-17502-2_13 | es |
dc.identifier.doi | 10.1007/978-3-642-17502-2_13 | es |
dc.publication.initialPage | 153 | es |
dc.publication.endPage | 162 | es |
dc.eventtitle | MobiSec 2010: Second International ICST Conference, Security and Privacy in Mobile Information and Communication Systems | es |
dc.eventinstitution | Catania (Sicilia, Italia) | es |
dc.relation.publicationplace | Berlin | es |
dc.contributor.funder | Ministerio de Ciencia e Innovación (MICIN). España | es |