Blog
About

334
views
0
recommends
+1 Recommend
1 collections
    7
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Mobile devices forensic platform for malware detection

      , , , , ,

      6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR)

      Cyber Security Research

      10th-12th September 2019

      Malware, mobile terminal, forensic tools, security

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Nowadays, there is an unprecedented demand for mobile devices. Therefore, their number has increased in time, along with multiple possibly malicious activities which can be performed by or through these devices. The biggest issue is that most of them are not easily detectable or cannot be detected at all. This paper aims to present a platform developed precisely for the detection of malware that has not been prevented infecting the mobile device. By firstly analyzing the multiple tools that exist nowadays against malware, a selection of the best available ones was made in order to be implemented in the proposed system. The designed software platform integrates, in a unitary manner, the malware analysis techniques used nowadays for the existing mobile terminals, but also having the purpose of enhancing their security levels.

          Related collections

          Most cited references 4

          • Record: found
          • Abstract: not found
          • Article: not found

          Cyber Forensic Tools: A Review

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Forensic Acquisitions of WhatsApp Data on Popular Mobile Platforms

             A Shortall,  M. Azhar (2015)
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Attack Detection Application with Attack Tree for Mobile System using Log Analysis

               D. Kim,  D. SHIN,  Y-H KIM (2018)
                Bookmark

                Author and article information

                Contributors
                Conference
                September 2019
                September 2019
                : 59-66
                Affiliations
                BEIA Consult International

                Bucharest, Romania
                University Politehnica of Bucharest

                Bucharest, Romania
                Article
                10.14236/ewic/icscsr19.8
                © George Suciu et al. Published by BCS Learning and Development Ltd. 6th International Symposium for ICS & SCADA Cyber Security Research 2019

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                6th International Symposium for ICS & SCADA Cyber Security Research 2019
                ICS-CSR
                6
                Athens, Greece
                10th-12th September 2019
                Electronic Workshops in Computing (eWiC)
                Cyber Security Research
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article