Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services 2011
DOI: 10.1145/1999995.2000017
|View full text |Cite
|
Sign up to set email alerts
|

Security versus energy tradeoffs in host-based mobile malware detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 25 publications
0
17
0
Order By: Relevance
“…From a systems perspective, research has tackled many important aspects: understanding and improving energy management [36,59,26], network middleware [53], application execution models [30,29], security and privacy [25,32,34,39], and usability [27]. Prior research has also addressed several important issues centered around mobile functionality [55,65], data management [66], and disconnected access [49,37].…”
Section: Introductionmentioning
confidence: 99%
“…From a systems perspective, research has tackled many important aspects: understanding and improving energy management [36,59,26], network middleware [53], application execution models [30,29], security and privacy [25,32,34,39], and usability [27]. Prior research has also addressed several important issues centered around mobile functionality [55,65], data management [66], and disconnected access [49,37].…”
Section: Introductionmentioning
confidence: 99%
“…In 2010, [14] proposed a semi-distributed malware detection scheme which utilizes the social community structure and reflects a stable and controllable granularity of security to deal with the malware based on the infection history of the community. In 2011, [15] investigated the security versus energy tradeoffs and pointed that to enhance the accuracy of the detection, taking more computing and storage resources would be inevitable. In 2014, [16] proposed a distributed system for mobile malware detection with special optimization for limited storage of mobile devices.…”
Section: Malware Detection Systemsmentioning
confidence: 99%
“…By clustering spikes based on their shapes, we can identify characteristic shape patterns and reduce the number of spikes that need to be investigated by developers for a power trace. Rather than looking at all spikes, developers instead can focus on a small number of clusters (typically [10][11][12][13][14][15][16][17][18][19][20], each corresponding to a characteristic shape pattern with a list of associated spikes. Developers can also rollup the meta-information for each spike (such as length, modules, etc.)…”
Section: What Are the Characteristic Energy Shape Patterns?mentioning
confidence: 99%