International Journal of Soft Computing

Year: 2016
Volume: 11
Issue: 1
Page No. 1 - 3

The Role of Software Telephone Bugs in Mobile Security

Authors : Zhukov Igor, Mikhaylov Dmitry, Kharkov Sergey, KholyavinVitaliy and Nasenkov Igor

References

Inoue, K., Y. Higo, N. Yoshida, E. Choi, S. Kusumoto, K. Kim, W. Park and E. Lee, 2012. Experience of finding inconsistently-changed bugs in code clones of mobile software. Proceedings of the 6th International Workshop on Software Clones, June 2-9, 2012, Zurich, Switzerland, pp: 94-95.

Liang, G.T., J. Wang, S.C. Li and R. Chang, 2014. PatBugs: A pattern-based bug detector for cross-platform mobile applications. Proceedings of the IEEE International Conference on Mobile Services, June 27-July 2, 2014, Anchorage, AK., Pages: 84-91.

Mikhaylov, D.М. and Z.I. Yu, 2011. Protection of MOBILE devices from Attacks. Foylisс, Moscow, pp: 192.

Mikhaylov, D.М., A.S. Smirnov, A.M. Tolstats and N.V. Kuznetsov, 2012. Using of phonebugs for mobile attack. Digest of annotations of the Kurchatov youth Scientific School.

Mikhaylov, D., I. Zhukov, A. Starikovskiy, S. Kharkov, A. Tolstaya and A. Zuykov, 2013. Review of malicious mobile applications, phone bugs and other cyber threats to mobile devices. Proceedings of the 5th International Conference on Broadband Network and Multimedia Technology, November 17-19, 2013, Guilin, pp: 302-305.

Mikhaylov, D.M., A.V. Zuykov, I.U. Zhukov, A.G. Beltov, A.V. Starikovskiy, M.I. Froimson and A.M. Tolstaya, 2011. The research of mobile vulnerabilities in apple and Google systems. Sci. Tech. J., 6: 38-40.

Pu, S., Z. Chen, H. Chen, Y. Liu and B. Zen, 2014. Threat analysis of smart mobile device. Proceedings of the 31th URSI General Assembly and Scientific Symposium, Auguest 16-23, 2014, Beijing, Pages: 1-3.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved