Virtual smartphone over IP
- 1 June 2010
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
The number of smartphone users and mobile application offerings are growing rapidly. A smartphone is often expected to offer PC-like functionality. In this paper, we present Virtual Smartphone over IP system that allows users to create virtual smartphone images in the mobile cloud and to customize each image to meet different needs. Users can easily and freely tap into the power of the data center by installing the desired mobile applications remotely in one of these images. Because the mobile applications are controlled remotely, they are not constrained by the limit of processing power, memory and battery life of a physical smartphone.Keywords
This publication has 12 references indexed in Scilit:
- The Case for VM-Based Cloudlets in Mobile ComputingIEEE Pervasive Computing, 2009
- Smartphone malware evolution revisited: Android next target?Published by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Detecting Symbian OS malware through static function call analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Using end-to-middle security to protect against evil twin access pointsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Detecting energy-greedy anomalies and mobile malware variantsPublished by Association for Computing Machinery (ACM) ,2008
- Behavioral detection of malware on mobile handsetsPublished by Association for Computing Machinery (ACM) ,2008
- Can you infect me now?Published by Association for Computing Machinery (ACM) ,2007
- On the Effort to Create Smartphone Worms in Windows MobilePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Highly Reliable Mobile Desktop Computing in Your PocketPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- About malicious software in smartphonesJournal of Computer Virology and Hacking Techniques, 2006