Sohr et al., 2011 - Google Patents
Software security aspects of Java-based mobile phonesSohr et al., 2011
View PDF- Document ID
- 8050404763615243529
- Author
- Sohr K
- Mustafa T
- Nowak A
- Publication year
- Publication venue
- Proceedings of the 2011 ACM Symposium on Applied Computing
External Links
Snippet
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This not only applies to security-critical mobile applications such as m-banking or m-commerce …
- 238000004458 analytical method 0 abstract description 25
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/66—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/02—Constructional features of telephone sets
- H04M1/0202—Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11514159B2 (en) | Method and system for preventing and detecting security threats | |
Jia et al. | ContexloT: Towards providing contextual integrity to appified IoT platforms. | |
Bugiel et al. | Xmandroid: A new android evolution to mitigate privilege escalation attacks | |
US8769305B2 (en) | Secure execution of unsecured apps on a device | |
Shabtai et al. | Google android: A comprehensive security assessment | |
Shabtai et al. | Google android: A state-of-the-art review of security mechanisms | |
RU2390836C2 (en) | Authenticity display from highly reliable medium to non-secure medium | |
US8893298B2 (en) | Network linker for secure execution of unsecured apps on a device | |
Spensky et al. | Sok: Privacy on mobile devices–it’s complicated | |
Backes et al. | Appguard-real-time policy enforcement for third-party applications | |
US9542552B2 (en) | Extensible platform for securing apps on a mobile device using policies and customizable action points | |
US20140040622A1 (en) | Secure unlocking and recovery of a locked wrapped app on a mobile device | |
AU2012214619A1 (en) | Securing and managing apps on a device | |
CN102724204A (en) | Secure and trusted capability opening platform | |
Sohr et al. | Software security aspects of Java-based mobile phones | |
Zungur et al. | Borderpatrol: Securing byod using fine-grained contextual information | |
Muthukumaran et al. | Protecting the integrity of trusted applications in mobile phone systems | |
Zhang et al. | Design and implementation of efficient integrity protection for open mobile platforms | |
Jeong et al. | SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform | |
Becher | Security of smartphones at the dawn of their ubiquitousness | |
Moreno et al. | Chrowned by an extension: abusing the Chrome DevTools protocol through the debugger API | |
Nazar et al. | Rooting Android–Extending the ADB by an auto-connecting WiFi-accessible service | |
Malik et al. | Behaviour analysis of android application | |
Wang et al. | RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop | |
Gowrisankar et al. | GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone |