作者: Δημήτριος Δαμόπουλος , Dimitrios Damopoulos
DOI:
关键词:
摘要: Mobile devices have evolved and experienced an immense popularity over the last few years. Nevertheless, this growth has exposed mobile to increasing number of security threats. It is thus for sure that despite variety peripheral protection mechanisms described in literature, (post)authentication access control techniques imposed by Operating Systems (OS) such devices, integral against advanced intrusions cannot be adequately enforced. More specifically, sophisticated, powerful OSs, as Android iOS, services they can support bring new opportunities attackers toward compromising device data stored on it. This along with rise malware which anticipated comprise a serious threat near future. Therefore, research community constantly seeking solutions cope these newly-introduced perils. Thus, need more intelligent sophisticated controls Intrusion Detection Prevention (IDPS) deemed necessary. However, whilst much work been devoted IDSs general, anomaly-based or behavior-based IDS limited leaving several problems unsolved. Motivated fact, doctoral thesis focuses design development anomaly IDPS modern devices. Moreover, best our knowledge, it first explore, propose evaluate behavioral-based characteristics used towards enchancing context we show monitoring user’s touch patterns behaviors utilize popular applications (e.g., SMS, Call, Internet), and/or profiling native system calls produced active (running) service, one able very reliable accurate detecting malicious behavior malwares unauthorised use. The IPD proposed evaluated present are capable undocumented illegitimate usage services. achieved providing continuous authentication ensure legitimate use prevent threats via post-authentication non-repudiation response schemes. supported experimental results attest e ciency mechanisms. particular emphasis throughout put understand, explore how novel exploited violate confidentiality, integrity, availability, authenticity privacy requirements means that, attacking smartphone platforms services, considering di↵erent attack vectors, allowed us create proper IDP Last but not least, theoretical framework introduced o↵ering food thought future exciting field.