Becher, 2009 - Google Patents
Security of smartphones at the dawn of their ubiquitousnessBecher, 2009
View PDF- Document ID
- 4305471951209960503
- Author
- Becher M
- Publication year
- Publication venue
- None
External Links
Snippet
The importance of researching in the field of smartphone security is substantiated in the increasing number of smartphones, which are expected to outnumber common computers in the future. Despite their increasing importance, it is unclear today if mobile malware will play …
- 238000003892 spreading 0 abstract description 39
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
- G06F1/20—Cooling means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10924517B2 (en) | Processing network traffic based on assessed security weaknesses | |
US11546371B2 (en) | System and method for determining actions to counter a cyber attack on computing devices based on attack vectors | |
Becher et al. | Mobile security catching up? revealing the nuts and bolts of the security of mobile devices | |
Jang-Jaccard et al. | A survey of emerging threats in cybersecurity | |
US9473485B2 (en) | Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing | |
La Polla et al. | A survey on security for mobile devices | |
Jeon et al. | A practical analysis of smartphone security | |
Delac et al. | Emerging security threats for mobile platforms | |
Dunham | Mobile malware attacks and defense | |
Jakobsson et al. | Crimeware: understanding new attacks and defenses | |
Al-Turjman et al. | Cyber security in mobile social networks | |
Teufl et al. | Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) | |
US20140040622A1 (en) | Secure unlocking and recovery of a locked wrapped app on a mobile device | |
Schmidt | Detection of smartphone malware | |
Bianchi et al. | Exploitation and mitigation of authentication schemes based on device-public information | |
Schmidt et al. | Malicious software for smartphones | |
BalaGanesh et al. | Smart devices threats, vulnerabilities and malware detection approaches: a survey | |
Casati et al. | The dangers of rooting: data leakage detection in android applications | |
Anisetti et al. | Security threat landscape | |
Sohr et al. | Software security aspects of Java-based mobile phones | |
Becher | Security of smartphones at the dawn of their ubiquitousness | |
Zhang et al. | Design and implementation of efficient integrity protection for open mobile platforms | |
Tully et al. | Mobile security: a practitioner’s perspective | |
Özdemir et al. | Investigation of Attack Types in Android Operating System | |
Armin | Mobile threats and the underground marketplace |