Movatterモバイル変換


[0]ホーム

URL:


Robert et al., 2023 - Google Patents

Block Chain based Malware Detection System for Smartphone Application

Robert et al., 2023

Document ID
16463015981890368630
Author
Robert P
Senkamalavalli R
Vedanarayanan V
Manivannan D
Publication year
Publication venue
2023 8th International Conference on Communication and Electronics Systems (ICCES)

External Links

Snippet

The quick rise of smartphone malware indicates that cybercriminals are switching from traditional personal computer systems to mobile devices. For adequate security, technology specialists are currently creating new anti-malware techniques. This study proposes the use …
Continue reading atieeexplore.ieee.org (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Programme initiating; Programme switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/485Task life-cycle, e.g. stopping, restarting, resuming execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Similar Documents

PublicationPublication DateTitle
Velmurugadass et al.Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm
Khalil et al.A comparative analysis on blockchain versus centralized authentication architectures for IoT-enabled smart devices in smart cities: a comprehensive review, recent advances, and future research directions
US9967333B2 (en)Deferred configuration or instruction execution using a secure distributed transaction ledger
JP2019515534A (en) Method and system for controlling contract execution using distributed hash tables and peer-to-peer distributed ledgers
CN115391749A (en) Method and system for securing computer software using distributed hash table and blockchain
Ahmad et al.Machine learning-based intelligent security framework for secure cloud key management
WO2023046409A1 (en)Digital asset platform with hsm verification
Mahmood et al.Blockchain technology and internet of things: review, challenge and security concern
Mayuranathan et al.RETRACTED ARTICLE: Enhanced security in cloud applications using emerging blockchain security algorithm
CN112074861A (en)Block chain based messaging service for time sensitive events
Kumar et al.The blockchain technology for secure and smart applications across industry verticals
Al Neyadi et al.Role-based access control in private blockchain for iot integrated smart contract
Sharma et al.A two-tier security solution for storing data across public cloud
Ullah et al.Blockchain‐IoT: A revolutionary model for secure data storage and fine‐grained access control in internet of things
Poberezhnyk et al.Developing of Blockchain Method in Message Interchange Systems.
Das et al.Data privacy in IoT network using blockchain technology
Robert et al.Block Chain based Malware Detection System for Smartphone Application
SubhaAssessing security features of blockchain technology
Gattoju et al.Design of ChaApache framework for securing Hadoop application in big data
Chenli et al.Provnet: Networked blockchain for decentralized secure provenance
BardeBlockchain-based cyber security
Mahlous et al.The adoption of blockchain technology in iot: An insight view
Khan et al.The applications of blockchains in addressing the integration and security of iot systems: A survey
Eshan et al.Deficiencies in blockchain technology and potential augmentation in cyber security
Gandhi et al.Blockchain technology: Concept, applications, challenges, and security threats

[8]
ページ先頭

©2009-2025 Movatter.jp