Uri Kanonov | Microsoft - Academia.edu (original) (raw)

Related Authors

Xiaoge Xu

Xiaoge Xu

University of Nottingham, China Campus

Peretz Shoval

Muhammad Najmi Ahmad Zabidi

maya  el hajj

Enric Serradell-Lopez

Vinicius Klein

Sumarie Roodt

David Gellner

Nikola  Milosevic

Bálint Molnár

Uploads

Papers by Uri Kanonov

Research paper thumbnail of Secure Containers in Android

Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM'16, 2016

Research paper thumbnail of Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach

Lecture Notes in Computer Science, 2009

... The HIDS employs a light-weight Incremental KBTA detector. A smartphone securityontology for ... more ... The HIDS employs a light-weight Incremental KBTA detector. A smartphone securityontology for detecting the malware was defined. The ontology includes five different temporal patterns of potentially malicious behavior: Denial ...

Research paper thumbnail of Google Android: A State-of-the-Art Review of Security Mechanisms

Computing Research Repository, 2009

Google's Android is a comprehensive software framework for mobile communication devices (i.e.... more Google's Android is a comprehensive software framework for mobile communication devices (i.e., smartphones, PDAs). The Android framework includes an operating system, middleware and a set of key applications. The incorporation of integrated access services to the Internet on such mobile devices, however, increases their exposure to damages inflicted by various types of malware. This paper provides a comprehensive security assessment

Research paper thumbnail of Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method

Journal of Systems and Software, 2010

... View Within Article. Two methods are applicable for defining the domain knowledge and more sp... more ... View Within Article. Two methods are applicable for defining the domain knowledge and more specifically mobile phone security ontology (specializing in detectingmalware). The first method involves the security expert using ...

Research paper thumbnail of “Andromaly”: a behavioral malware detection framework for android devices

Journal of Intelligent Information Systems, 2012

... processes that are likely to b e b attery-draining attacks. Jacoby and Davis ( 2004 ) H IDS S... more ... processes that are likely to b e b attery-draining attacks. Jacoby and Davis ( 2004 ) H IDS S ignature-based detection M onitoring power ... Jacoby and Davis (2004) presented a host Battery-Based Intrusion Detection System (B-BID) as a mean of improving mobile device security. ...

Research paper thumbnail of Google Android: A Comprehensive Security Assessment

IEEE Security & Privacy Magazine, 2000

Research paper thumbnail of Secure Containers in Android

Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM'16, 2016

Research paper thumbnail of Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach

Lecture Notes in Computer Science, 2009

... The HIDS employs a light-weight Incremental KBTA detector. A smartphone securityontology for ... more ... The HIDS employs a light-weight Incremental KBTA detector. A smartphone securityontology for detecting the malware was defined. The ontology includes five different temporal patterns of potentially malicious behavior: Denial ...

Research paper thumbnail of Google Android: A State-of-the-Art Review of Security Mechanisms

Computing Research Repository, 2009

Google's Android is a comprehensive software framework for mobile communication devices (i.e.... more Google's Android is a comprehensive software framework for mobile communication devices (i.e., smartphones, PDAs). The Android framework includes an operating system, middleware and a set of key applications. The incorporation of integrated access services to the Internet on such mobile devices, however, increases their exposure to damages inflicted by various types of malware. This paper provides a comprehensive security assessment

Research paper thumbnail of Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method

Journal of Systems and Software, 2010

... View Within Article. Two methods are applicable for defining the domain knowledge and more sp... more ... View Within Article. Two methods are applicable for defining the domain knowledge and more specifically mobile phone security ontology (specializing in detectingmalware). The first method involves the security expert using ...

Research paper thumbnail of “Andromaly”: a behavioral malware detection framework for android devices

Journal of Intelligent Information Systems, 2012

... processes that are likely to b e b attery-draining attacks. Jacoby and Davis ( 2004 ) H IDS S... more ... processes that are likely to b e b attery-draining attacks. Jacoby and Davis ( 2004 ) H IDS S ignature-based detection M onitoring power ... Jacoby and Davis (2004) presented a host Battery-Based Intrusion Detection System (B-BID) as a mean of improving mobile device security. ...

Research paper thumbnail of Google Android: A Comprehensive Security Assessment

IEEE Security & Privacy Magazine, 2000

Log In