[go: up one dir, main page]

Sohr et al., 2011 - Google Patents

Software security aspects of Java-based mobile phones

Sohr et al., 2011

View PDF
Document ID
8050404763615243529
Author
Sohr K
Mustafa T
Nowak A
Publication year
Publication venue
Proceedings of the 2011 ACM Symposium on Applied Computing

External Links

Snippet

More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This not only applies to security-critical mobile applications such as m-banking or m-commerce …
Continue reading at www.informatik.uni-bremen.de (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/66Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
    • H04M1/725Cordless telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
US11514159B2 (en) Method and system for preventing and detecting security threats
Jia et al. ContexloT: Towards providing contextual integrity to appified IoT platforms.
Bugiel et al. Xmandroid: A new android evolution to mitigate privilege escalation attacks
US8769305B2 (en) Secure execution of unsecured apps on a device
Shabtai et al. Google android: A comprehensive security assessment
Shabtai et al. Google android: A state-of-the-art review of security mechanisms
RU2390836C2 (en) Authenticity display from highly reliable medium to non-secure medium
US8893298B2 (en) Network linker for secure execution of unsecured apps on a device
Spensky et al. Sok: Privacy on mobile devices–it’s complicated
Backes et al. Appguard-real-time policy enforcement for third-party applications
US9542552B2 (en) Extensible platform for securing apps on a mobile device using policies and customizable action points
US20140040622A1 (en) Secure unlocking and recovery of a locked wrapped app on a mobile device
AU2012214619A1 (en) Securing and managing apps on a device
CN102724204A (en) Secure and trusted capability opening platform
Sohr et al. Software security aspects of Java-based mobile phones
Zungur et al. Borderpatrol: Securing byod using fine-grained contextual information
Muthukumaran et al. Protecting the integrity of trusted applications in mobile phone systems
Zhang et al. Design and implementation of efficient integrity protection for open mobile platforms
Jeong et al. SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform
Becher Security of smartphones at the dawn of their ubiquitousness
Moreno et al. Chrowned by an extension: abusing the Chrome DevTools protocol through the debugger API
Nazar et al. Rooting Android–Extending the ADB by an auto-connecting WiFi-accessible service
Malik et al. Behaviour analysis of android application
Wang et al. RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop
Gowrisankar et al. GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone