메뉴 건너뛰기




Volumn 5692 LNCS, Issue , 2009, Pages 50-61

Do you trust your phone?

Author keywords

Caller ID spoofing; Identity theft; Mobile malware; NGN; SMS security; SMS spoofing; Telephone pharming; Telephone phishing; Untraceability; VoIP security

Indexed keywords

CRIME; ELECTRONIC COMMERCE; INTERNET TELEPHONY; MALWARE; NETWORK SECURITY; TELECOMMUNICATION INDUSTRY; TELEPHONE SETS; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 70350755355     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03964-5_6     Document Type: Conference Paper
Times cited : (33)

References (21)
  • 1
    • 78649952291 scopus 로고    scopus 로고
    • Security and Denial of Service Threats in GSM Networks. Periodica Politechnica
    • ISSN 1224-600X
    • Bocan, V., Cretu, V.: Security and Denial of Service Threats in GSM Networks. Periodica Politechnica, Transactions on Automatic Control and Computer Science 49(63) (2004) ISSN 1224-600X
    • (2004) Transactions on Automatic Control and Computer Science , vol.49 , Issue.63
    • Bocan, V.1    Cretu, V.2
  • 2
    • 70350763926 scopus 로고    scopus 로고
    • Exploiting Open Functionality in SMS-Capable Cellular Networks
    • Alexandria, VA, USA, November, 2005
    • Enck, W., Traynor, P., McDaniel, P., La Porta, T.: Exploiting Open Functionality in SMS-Capable Cellular Networks. In: Proc. of CCS 2005, Alexandria, VA, USA, November 2005, pp. 7-11 (2005)
    • (2005) Proc. of CCS , pp. 7-11
    • Enck, W.1    Traynor, P.2    McDaniel, P.3    La Porta, T.4
  • 3
    • 24944538070 scopus 로고    scopus 로고
    • Security Threats and Their Countermeasures of Mobile Portable Computing Devices in Ubiquitous Computing Environments
    • Gervasi, O, Gavrilova, M.L, Kumar, V, Laganá, A, Lee, H.P, Mun, Y, Taniar, D, Tan, C.J.K, eds, ICCSA 2005, Springer, Heidelberg
    • Kim, S.h., Leem, C.S.: Security Threats and Their Countermeasures of Mobile Portable Computing Devices in Ubiquitous Computing Environments. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3483, pp. 79-85. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3483 , pp. 79-85
    • Kim, S.H.1    Leem, C.S.2
  • 4
    • 28244472716 scopus 로고    scopus 로고
    • E-mail Authentication Is Here, but Has It Arrived Yet?
    • Lawton, G.: E-mail Authentication Is Here, but Has It Arrived Yet? IEEE Computer 38(11), 17-19 (2005)
    • (2005) IEEE Computer , vol.38 , Issue.11 , pp. 17-19
    • Lawton, G.1
  • 6
    • 13444260080 scopus 로고    scopus 로고
    • Consumer-Perceived Risk in E-Commerce Transactions
    • Salam, A.F., Rao, H.R., Pegels, C.C.: Consumer-Perceived Risk in E-Commerce Transactions. Comm. of the ACM 46(12), 325-331 (2003)
    • (2003) Comm. of the ACM , vol.46 , Issue.12 , pp. 325-331
    • Salam, A.F.1    Rao, H.R.2    Pegels, C.C.3
  • 7
    • 54249156151 scopus 로고    scopus 로고
    • Telelogin: A Two-factor Two-path Authentication Technique Using Caller ID, NTT Information Sharing Platform Laboratories
    • August
    • Fujii, H., Shigematsu, N., Kurokawa, H., Nakagawa, T.: Telelogin: a Two-factor Two-path Authentication Technique Using Caller ID, NTT Information Sharing Platform Laboratories, NTT Technical Review, Vol. 6(8) (August 2008), https:// www.ntt-review.jp/archive/ntttechnical.php?contents=ntr200808le3.html
    • (2008) NTT Technical Review , vol.6 , Issue.8
    • Fujii, H.1    Shigematsu, N.2    Kurokawa, H.3    Nakagawa, T.4
  • 8
    • 23344447680 scopus 로고    scopus 로고
    • Why Spyware Poses Multiple Threats to Security?
    • Thompson, R.: Why Spyware Poses Multiple Threats to Security? Communications of the ACM 48(8), 41-43 (2005)
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 41-43
    • Thompson, R.1
  • 9
    • 67649678799 scopus 로고    scopus 로고
    • Providing True End-to-End Security in Converged Voice Over IP Infrastructures
    • in press, January
    • Palmieri, F., Fiore, U.: Providing True End-to-End Security in Converged Voice Over IP Infrastructures. Journal of Computer & Security (in press) (January 2009), http://dx.doi.org/10.1016/j.cose.2009.01.004
    • (2009) Journal of Computer & Security
    • Palmieri, F.1    Fiore, U.2
  • 10
    • 70350754420 scopus 로고    scopus 로고
    • 3rd Generation Partnership Project, Technical realization of the Short Message Service (SMS), Rel. 5.1.0, 3GPP Technical Specific Group Terminals (2001)
    • 3rd Generation Partnership Project, Technical realization of the Short Message Service (SMS), Rel. 5.1.0, 3GPP Technical Specific Group Terminals (2001)
  • 11
    • 70350761752 scopus 로고    scopus 로고
    • Internet Protocol Telephony and Voice Over the Internet Protocol, Security Technical Implementation Guide, Defense Information Systems Agency (DISA) for the U.S. Department of Defense (DOD), Version 2, Rel. 2 (April 2006), http://iase.disa.mil/stigs/stig/VoIP-STIG-V2R2.pdf
    • Internet Protocol Telephony and Voice Over the Internet Protocol, Security Technical Implementation Guide, Defense Information Systems Agency (DISA) for the U.S. Department of Defense (DOD), Version 2, Rel. 2 (April 2006), http://iase.disa.mil/stigs/stig/VoIP-STIG-V2R2.pdf
  • 13
    • 70350761755 scopus 로고    scopus 로고
    • Caller ID spoofing with PHP and asterisk (last updated 14 February 2006), http:// www.nata2.org/2006/02/14/caller-id-spoofing-with-php-and-asterisk/
    • Caller ID spoofing with PHP and asterisk (last updated 14 February 2006), http:// www.nata2.org/2006/02/14/caller-id-spoofing-with-php-and-asterisk/
  • 14
    • 70350774137 scopus 로고    scopus 로고
    • The definitive resource on Caller ID spoofing (last updated, 20 February 2009), http://www.calleridspoofing.info/
    • The definitive resource on Caller ID spoofing (last updated, 20 February 2009), http://www.calleridspoofing.info/
  • 15
    • 70350786472 scopus 로고    scopus 로고
    • Running your own GSM network, 25th Chaos Communication Congress (last updated, 29 December 2008), http://events.ccc.de/congress/2008/Fahrplan/events/ 3007.en.html
    • Running your own GSM network, 25th Chaos Communication Congress (last updated, 29 December 2008), http://events.ccc.de/congress/2008/Fahrplan/events/ 3007.en.html
  • 17
    • 70350746266 scopus 로고    scopus 로고
    • SMiShing: SMs phISHING, Wikipedia, the free encyclopedia (last updated, 1 May 2009), http://en.wikipedia.org/wiki/SMiShing
    • SMiShing: SMs phISHING, Wikipedia, the free encyclopedia (last updated, 1 May 2009), http://en.wikipedia.org/wiki/SMiShing
  • 19
    • 65249112049 scopus 로고    scopus 로고
    • A New Era of Presidential Security: The President and His BlackBerry
    • Harauz, J., Kaufman, L.M.: A New Era of Presidential Security: The President and His BlackBerry. IEEE Security & Privacy 7(2), 67-70 (2009)
    • (2009) IEEE Security & Privacy , vol.7 , Issue.2 , pp. 67-70
    • Harauz, J.1    Kaufman, L.M.2
  • 20
    • 70350755675 scopus 로고    scopus 로고
    • Jailbreak (iPhone), Wikipedia, the free encyclopedia (last updated 29 April 2009), http://en.wikipedia.org/wiki/Jailbreak-(iPhone)
    • Jailbreak (iPhone), Wikipedia, the free encyclopedia (last updated 29 April 2009), http://en.wikipedia.org/wiki/Jailbreak-(iPhone)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.