Movatterモバイル変換


[0]ホーム

URL:


Becher, 2009 - Google Patents

Security of smartphones at the dawn of their ubiquitousness

Becher, 2009

ViewPDF
Document ID
4305471951209960503
Author
Becher M
Publication year
Publication venue
None

External Links

Snippet

The importance of researching in the field of smartphone security is substantiated in the increasing number of smartphones, which are expected to outnumber common computers in the future. Despite their increasing importance, it is unclear today if mobile malware will play …
Continue reading atmadoc.bib.uni-mannheim.de (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • G06F1/20Cooling means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network

Similar Documents

PublicationPublication DateTitle
Becher et al.Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
US20210152592A1 (en)System and method for determining actions to counter a cyber attack on computing devices based on attack vectors
Jang-Jaccard et al.A survey of emerging threats in cybersecurity
La Polla et al.A survey on security for mobile devices
Jakobsson et al.Crimeware: understanding new attacks and defenses
US9473485B2 (en)Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing
Jeon et al.A practical analysis of smartphone security
Delac et al.Emerging security threats for mobile platforms
ChessSecurity issues in mobile code systems
Al-Turjman et al.Cyber security in mobile social networks
US9396325B2 (en)Provisioning an app on a device and implementing a keystore
Teufl et al.Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
US20140040622A1 (en)Secure unlocking and recovery of a locked wrapped app on a mobile device
EP2766846A1 (en)System and method for profile based filtering of outgoing information in a mobile environment
Bianchi et al.Exploitation and mitigation of authentication schemes based on device-public information
Chimuco et al.Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
Anisetti et al.Security threat landscape
SchmidtDetection of smartphone malware
Schmidt et al.Malicious software for smartphones
Casati et al.The dangers of rooting: data leakage detection in android applications
BalaGanesh et al.Smart devices threats, vulnerabilities and malware detection approaches: a survey
Sohr et al.Software security aspects of Java-based mobile phones
BecherSecurity of smartphones at the dawn of their ubiquitousness
Zhang et al.Design and implementation of efficient integrity protection for open mobile platforms
Walls et al.A study of the effectiveness abs reliability of android free anti-mobile malware apps

[8]
ページ先頭

©2009-2025 Movatter.jp