[go: nahoru, domu]

Becher, 2009 - Google Patents

Security of smartphones at the dawn of their ubiquitousness

Becher, 2009

View PDF
Document ID
4305471951209960503
Author
Becher M
Publication year
Publication venue
None

External Links

Snippet

The importance of researching in the field of smartphone security is substantiated in the increasing number of smartphones, which are expected to outnumber common computers in the future. Despite their increasing importance, it is unclear today if mobile malware will play …
Continue reading at madoc.bib.uni-mannheim.de (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • G06F1/20Cooling means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network

Similar Documents

Publication Publication Date Title
US10924517B2 (en) Processing network traffic based on assessed security weaknesses
US11546371B2 (en) System and method for determining actions to counter a cyber attack on computing devices based on attack vectors
Becher et al. Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
Jang-Jaccard et al. A survey of emerging threats in cybersecurity
US9473485B2 (en) Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing
La Polla et al. A survey on security for mobile devices
Jeon et al. A practical analysis of smartphone security
Delac et al. Emerging security threats for mobile platforms
Dunham Mobile malware attacks and defense
Jakobsson et al. Crimeware: understanding new attacks and defenses
Al-Turjman et al. Cyber security in mobile social networks
Teufl et al. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
US20140040622A1 (en) Secure unlocking and recovery of a locked wrapped app on a mobile device
Schmidt Detection of smartphone malware
Bianchi et al. Exploitation and mitigation of authentication schemes based on device-public information
Schmidt et al. Malicious software for smartphones
BalaGanesh et al. Smart devices threats, vulnerabilities and malware detection approaches: a survey
Casati et al. The dangers of rooting: data leakage detection in android applications
Anisetti et al. Security threat landscape
Sohr et al. Software security aspects of Java-based mobile phones
Becher Security of smartphones at the dawn of their ubiquitousness
Zhang et al. Design and implementation of efficient integrity protection for open mobile platforms
Tully et al. Mobile security: a practitioner’s perspective
Özdemir et al. Investigation of Attack Types in Android Operating System
Armin Mobile threats and the underground marketplace