Smart-Phone Attacks and Defenses

作者: Wenwu Zhu , Helen J. Wang , Chuanxiong Guo

DOI:

关键词:

摘要: Internet has been permeating into every corner of the world and aspect our lives, empowering us with anywhere, anytime remote access control over information, personal communications (e.g., through smart-phones), environment use sensors, actuators, RFIDs). While enabling interoperation brings tremendous opportunities in service creation information access, security threat also dauntingly extends its reach. In this paper, we wish to alarm community that long-realized risk is becoming a reality: Smart-phones, interoperable between telecom networks Internet, are dangerous conduits for threats reach infrastructure. The damage caused by subverted smart-phones could range from privacy violation identity theft emergency call center DDoS attacks national crises. We describe defense solution space including smart-phone hardening approaches, Internet-side defense, telecom-side coordination mechanisms may be needed networks. Much yet explored.

参考文章(14)
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian Grizzard, John Levine, Henry Owen, HoneyStat: Local Worm Detection Using Honeypots recent advances in intrusion detection. pp. 39- 58 ,(2004) , 10.1007/978-3-540-30143-1_3
Geoffrey M. Voelker, Stefan Savage, David Moore, Inferring internet denial-of-service activity usenix security symposium. pp. 2- 2 ,(2001)
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
J A R I Hämäläinen, General packet radio service Springer, Boston, MA. pp. 65- 80 ,(1998) , 10.1007/0-306-47045-4_4
M. Rahnema, Overview of the GSM system and protocol architecture IEEE Communications Magazine. ,vol. 31, pp. 92- 100 ,(1993) , 10.1109/35.210402
L. Bos, S. Leroy, Toward an all-IP-based UMTS system architecture IEEE Network. ,vol. 15, pp. 36- 45 ,(2001) , 10.1109/65.898820
Christian Kreibich, Jon Crowcroft, Honeycomb: creating intrusion detection signatures using honeypots acm special interest group on data communication. ,vol. 34, pp. 51- 56 ,(2004) , 10.1145/972374.972384
Jain Cai, D.J. Goodman, General packet radio service in GSM IEEE Communications Magazine. ,vol. 35, pp. 122- 131 ,(1997) , 10.1109/35.623996
C. Peersman, S. Cvetkovic, P. Griffiths, H. Spear, The Global System for Mobile Communications Short Message Service IEEE Personal Communications. ,vol. 7, pp. 15- 23 ,(2000) , 10.1109/98.847919