[1] HUA J, SAKURAI K. A SMS-based mobile botnet using flooding algorithm [C]//Proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practice, LNCS 6633. Berlin: Springer, 2011: 264-279. [2] ZENG Y, SHIN K G, HU X. Design of SMS commanded-and-controlled and P2P-structured mobile botnets [C]//WISEC'12:Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York: ACM, 2012: 137-148. [3] MULLINER C, SEIFERT J-P. Rise of the iBots: Owning a telco network [C]//Proceedings of the 2010 5th International Conference on Malicious and Unwanted Software (MALWARE). Piscataway: IEEE, 2010: 71-80. [4] GENG G, CHEN D, GAO H, et al. Design and analysis of mobile botnets [J]. Journal of Tsinghua University: Science and Technology, 2011, 51(10): 1329-1334. (耿贵宁, 陈冬青, 高海辉, 等. 移动僵尸网络的设计及分析[J]. 清华大学学报:自然科学版, 2011, 51(10): 1329-1334.) [5] SINGH K, SANGAL S, JAIN N, et al. Evaluating bluetooth as a medium for botnet command and control [C]//DIMVA 2010: Proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Berlin: Springer, 2010: 61-80. [6] CUI X, FANG B, YIN L, et al. Andbot: towards advanced mobile botnets [C]//Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats. Berkley: USENIX Assocaition, 2011: 11-11. [7] WANG S, CUI X, LIAO P, et al. S-URL Flux: A novel C&C protocol for mobile botnets [C]//ISCTCS 2012: Proceedings of the International Conference on Trustworthy Computing and Services, Communications in Computer and Information Science 320. Berlin: Springer, 2013: 412-419. [8] KNYSZ M, HU X, ZENG Y, et al. Open WiFi networks: Lethal weapons for botnets? [C]//Proceedings of the 2012 IEEE INFOCOM. Piscataway: IEEE, 2012: 2631-2635. [9] NASSAR M, STATE R, FESTOR O. VoIP malware: attack tool & attack scenarios [C]//ICC'09: Proceedings of the 2009 IEEE International Conference on Communications. Piscataway: IEEE, 2009: 1-6. [10] WANG P, GONZÁLEZ M C, HIDALGO C A, et al. Understanding the spreading patterns of mobile phone viruses [J]. Science, 2009, 324(5930): 1071-1076. [11] THOMAS K, NICOL D M. The Koobface botnet and the rise of social malware [C]//Proceedings of the 2010 5th International Conference on Malicious and Unwanted Software (MALWARE). Piscatway: IEEE, 2010: 63-70. [12] NAGARAJA S, HOUMANSADR A, PIYAWONGWISAL P, et al. Stegobot: a covert social network botnet [C]//IH'11: Proceedings of the 13th International Conference on Information Hiding. Berlin: Springer, 2011: 299-313. [13] LI Y, ZHAI L, WANG H, et al. Mobile botnet based on SNS [J]. Journal of Computer Research and Development, 2012, 49(S2): 1-8. (李跃, 翟立东, 王宏霞, 等. 一种基于社交网络的移动僵尸网络研究[J]. 计算机研究与发展, 2012, 49(S2): 1-8.) [14] Google. Google Cloud Messaging for Android [EB/OL]. [2014-12-03]. http://developer.android.com/google/gcm/index.html. [15] CHEN W, GONG P, YU L, et al. An adaptive push-styled command and control mechanism in mobile botnets [J]. Wuhan University Journal of Natural Sciences, 2013, 18(5): 427-434. [16] ZHAO S, LEE P P C, LUI J C S, et al. Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service [C]//ACSAC'12: Proceedings of the 28th Annual Computer Security Applications Conference. New York: ACM, 2012: 119-128. [17] LEE H, KANG T, LEE S, et al. Punobot: mobile botnet using push notification service in Android [C]//WISA 2013: Proceedings of the 14th International Workshop on Information Security Applications. Berlin: Springer, 2014: 124-137. [18] Apple Inc. About local notifications and push notifications [EB/OL]. [2014-12-03]. http://developer.apple.com/library/mac/#documentation/NetworkingInternet/Conceptual/RemoteNotificationsPG/index.html. [19] Microsoft. Push notifications (Windows phone) [EB/OL]. [2014-12-03]. http://technet.microsoft.com/zh-tw/library/hh221549.aspx. [20] BlackBerry. Push Service [EB/OL]. [2014-12-04]. http://developer.blackberry.com/java/documentation/push_service_overview.html. [21] Google. Making the most of Google cloud messaging [EB/OL]. [2014-12-04]. http://developer.android.com/training/cloudsync/gcm.html#multicast. [22] Google. GCM advanced topics [EB/OL]. [2014-12-04]. http://developer.android.com/google/gcm/adv.html#payload. [23] FANG B, CUI X, WANG W. Survey of botnets [J]. Journal of Computer Research and Development, 2011, 48(8): 1315-1331. (方滨兴, 崔翔, 王威. 僵尸网络综述[J]. 计算机研究与发展, 2011, 48(08): 1315-1331.) [24] LI K, YU L, LI M, et al. Method for point-to-point information transmission of intelligent terminals:China, 102624912A[P].2012-03-20. (李科奕, 俞琳, 李明辉, 等. 一种智能终端点对点信息推送的方法:中国, 102624912A[P].2012-03-20.) [25] ZHOU Y, JIANG X. Dissecting Android malware: Characterization and evolution [C]//Proceedings of the 2012 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2012: 95-109. [26] ZHANG L, TIWANA B, QIAN Z, et al. Accurate online power estimation and automatic battery behavior based power model generation for smartphones [C]//Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis. New York: ACM, 2010: 105-114. |