Skip to main content

Security Of Smart Phones

Smart phones combine the functionality of mobile phones and PDAs. These devices have become commonplace during the past few years, integrating multiple wireless networking technologies to support additional functionality and services. Unfortunately, the development of both devices and services has been driven by market demand, focusing on new features and neglecting security. Therefore, smart phones now face new security problems not found elsewhere. We address two particular problems related to the increased capabilities of smart phones.

The first problem is related to the integration of multiple wireless interface. Here, an attack carried out through the wireless network interface may eventually provide access to the phone functionality.

This type of attack can cause considerable damage because some services charge the user based on the traffic or time of use. We have created a proof-of-concept attack to show the feasibility of such attacks.

To address these security issues, we have designed and implemented a solution based on resource labeling. Labels are used to track network service usage, and are transferred between processes and resources as a result of either access or execution. Experimental evaluation of our mechanism shows that it effectively prevents such attacks.

The second problem is the security analysis of software components running on smart phones. The particular application analyzed is the client part of the Multimedia Messaging Service (MMS).

The security of these components is critical because they might have access to private information and, if compromised, could be leveraged to spread an MMS-based worm.

Vulnerability analysis of these components is made difficult because they are closed-source and their testing has to be performed through the mobile phone network, making the testing time-consuming and costly.

File Type: PDF
File Size: 413 KB
Total Pages: 119

Direct Link Mega:
Download Now
Direct Link AnonFiles:
Download Now
Direct Link Mediafire:
Download Now
Direct Link Solidfiles:
Download Now
Direct Link Sabercathost:
Download Now
Direct Link Tusfiles:
Download Now


Popular posts from this blog

Web Hacking 101

With a Foreword written by HackerOne Co-Founders Michiel Prins and Jobert Abma, Web Hacking 101 is about the ethical exploration of software for security issues but learning to hack isn't always easy. With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different. Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties.

Hack-X-Crypt (By Ujjwal Sahay)

This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer hardware and software to carry out a goal outside of the creator‘s original intention. People who slot in computer hacking actions and activities are often entitled as hackers. The majority of people assume that hackers are computer criminals. They fall short to identify the fact that criminals and hackers are two entirely unrelated things.

High Performance Cloud Auditing

This eBook mainly focuses on cloud security and high performance computing for cloud auditing. The eBook discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments.