↓ Skip to main content

Research in Attacks, Intrusions, and Defenses

Overview of attention for book
Cover of 'Research in Attacks, Intrusions, and Defenses'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform’s Main Memory
  3. Altmetric Badge
    Chapter 2 Hypervisor Memory Forensics
  4. Altmetric Badge
    Chapter 3 Server-Side Code Injection Attacks: A Historical Perspective
  5. Altmetric Badge
    Chapter 4 Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets
  6. Altmetric Badge
    Chapter 5 Systematic Analysis of Defenses against Return-Oriented Programming
  7. Altmetric Badge
    Chapter 6 SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel
  8. Altmetric Badge
    Chapter 7 API Chaser: Anti-analysis Resistant Malware Analyzer
  9. Altmetric Badge
    Chapter 8 FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors
  10. Altmetric Badge
    Chapter 9 Deobfuscating Embedded Malware Using Probable-Plaintext Attacks
  11. Altmetric Badge
    Chapter 10 Detecting Traditional Packers, Decisively
  12. Altmetric Badge
    Chapter 11 Side-Channel Attacks on the Yubikey 2 One-Time Password Generator
  13. Altmetric Badge
    Chapter 12 Active Credential Leakage for Observing Web-Based Attack Cycle
  14. Altmetric Badge
    Chapter 13 Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications
  15. Altmetric Badge
    Chapter 14 Tamper-Resistant LikeJacking Protection
  16. Altmetric Badge
    Chapter 15 Deconstructing the Assessment of Anomaly-based Intrusion Detectors
  17. Altmetric Badge
    Chapter 16 Practical Context-Aware Permission Control for Hybrid Mobile Applications
  18. Altmetric Badge
    Chapter 17 Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses
  19. Altmetric Badge
    Chapter 18 Mobile Malware Detection Based on Energy Fingerprints — A Dead End?
  20. Altmetric Badge
    Chapter 19 Research in Attacks, Intrusions, and Defenses
  21. Altmetric Badge
    Chapter 20 Connected Colors: Unveiling the Structure of Criminal Networks
  22. Altmetric Badge
    Chapter 21 CloudFence: Data Flow Tracking as a Cloud Service
  23. Altmetric Badge
    Chapter 22 Practical Attacks against the I2P Network
Attention for Chapter 18: Mobile Malware Detection Based on Energy Fingerprints — A Dead End?
Altmetric Badge

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
64 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Mobile Malware Detection Based on Energy Fingerprints — A Dead End?
Chapter number 18
Book title
Research in Attacks, Intrusions, and Defenses
Published by
Springer Berlin Heidelberg, October 2013
DOI 10.1007/978-3-642-41284-4_18
Book ISBNs
978-3-64-241283-7, 978-3-64-241284-4
Authors

Johannes Hoffmann, Stephan Neumann, Thorsten Holz

Editors

Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 64 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Korea, Republic of 1 2%
Malaysia 1 2%
United States 1 2%
France 1 2%
Unknown 60 94%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 24 38%
Student > Master 10 16%
Researcher 6 9%
Other 5 8%
Student > Doctoral Student 3 5%
Other 7 11%
Unknown 9 14%
Readers by discipline Count As %
Computer Science 45 70%
Engineering 5 8%
Chemical Engineering 1 2%
Nursing and Health Professions 1 2%
Biochemistry, Genetics and Molecular Biology 1 2%
Other 2 3%
Unknown 9 14%