메뉴 건너뛰기




Volumn , Issue , 2011, Pages 96-111

Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices

Author keywords

Mobile security; Smartphones; Survey

Indexed keywords

MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; SURVEYS; TELEPHONE SETS;

EID: 80051969895     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.29     Document Type: Conference Paper
Times cited : (140)

References (101)
  • 1
    • 33744499088 scopus 로고    scopus 로고
    • Malicious code moves to mobile devices
    • N. Leavitt, "Malicious Code Moves to Mobile Devices," IEEE Computer, vol. 33, no. 12, 2000.
    • (2000) IEEE Computer , vol.33 , Issue.12
    • Leavitt, N.1
  • 2
    • 0042827876 scopus 로고    scopus 로고
    • Are handheld viruses a significant threat?
    • S. N. Foley and R. Dumigan, "Are Handheld Viruses a Significant Threat?" Commun. ACM, vol. 44, no. 1, 2001.
    • (2001) Commun. ACM , vol.44 , Issue.1
    • Foley, S.N.1    Dumigan, R.2
  • 3
    • 10944254818 scopus 로고    scopus 로고
    • Mobile phones as computing devices: The viruses are coming!
    • D. Dagon et al., "Mobile Phones as Computing Devices: The Viruses are Coming!" IEEE Pervasive Computing, vol. 3, no. 4, 2004.
    • (2004) IEEE Pervasive Computing , vol.3 , Issue.4
    • Dagon, D.1
  • 4
    • 18144370814 scopus 로고    scopus 로고
    • Mobile phones: The next frontier for hackers?
    • N. Leavitt, "Mobile Phones: The Next Frontier for Hackers?" IEEE Computer, vol. 38, no. 4, 2005.
    • (2005) IEEE Computer , vol.38 , Issue.4
    • Leavitt, N.1
  • 6
    • 58449085422 scopus 로고    scopus 로고
    • The wireless epidemic
    • Sep.
    • J. Kleinberg, "The Wireless Epidemic," Nature, vol. 449, no. 20, Sep. 2007.
    • (2007) Nature , vol.449 , Issue.20
    • Kleinberg, J.1
  • 7
    • 44649187943 scopus 로고    scopus 로고
    • Is it finally time to worry about mobile malware?
    • G. Lawton, "Is It Finally Time to Worry about Mobile Malware?" IEEE Computer, vol. 41, no. 5, 2008.
    • (2008) IEEE Computer , vol.41 , Issue.5
    • Lawton, G.1
  • 10
    • 85177665325 scopus 로고    scopus 로고
    • Virusability of modern mobile environments
    • Sep.
    • V. Bontchev, "Virusability of Modern Mobile Environments," in Virus Bulletin Conference, Sep. 2007.
    • (2007) Virus Bulletin Conference
    • Bontchev, V.1
  • 12
    • 80051984773 scopus 로고    scopus 로고
    • A. Portnoy, "Pwn2Own 2010," 2010, http://dvlabs.tippingpoint. com/blog/2010/02/15/pwn2own-2010.
    • (2010) Pwn2Own 2010
    • Portnoy, A.1
  • 18
  • 22
    • 85177645946 scopus 로고    scopus 로고
    • Bladox, s.r.o., "Turbo SIM," http://www.bladox.com/.
    • Turbo SIM
  • 24
    • 85177636943 scopus 로고    scopus 로고
    • OsmocomBB project, "SIMtrace," http://bb.osmocom.org/trac/wiki/ SIMtrace.
    • SIMtrace
  • 26
    • 85177698486 scopus 로고    scopus 로고
    • University of Glamorgan May
    • University of Glamorgan, "Disk Study 2008-2009," May 2009, http://isrg.weblog.glam.ac.uk/2009/5/7/disk-study-2008-2009.
    • (2009) Disk Study 2008-2009
  • 28
    • 43449099742 scopus 로고    scopus 로고
    • Instant ciphertext-only cryptanalysis of GSM encrypted communication
    • E. Barkan et al., "Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication," J. Cryptology, vol. 21, no. 3, 2008.
    • (2008) J. Cryptology , vol.21 , Issue.3
    • Barkan, E.1
  • 30
    • 85177666140 scopus 로고    scopus 로고
    • OsmocomBB project, "OpenBSC," http://openbsc.osmocom.org/trac/.
    • OpenBSC
  • 31
    • 85177699613 scopus 로고    scopus 로고
    • OpenBTS, "GSM. Simplified." http://openbts.sf.net/.
    • GSM. Simplified
  • 32
    • 33845449638 scopus 로고    scopus 로고
    • A related-key rectangle attack on the full KASUMI
    • E. Biham et al., "A Related-Key Rectangle Attack on the Full KASUMI," in ASIACRYPT, 2005.
    • (2005) ASIACRYPT
    • Biham, E.1
  • 34
    • 34247488845 scopus 로고    scopus 로고
    • Impact of paging channel overloads or attacks on a cellular network
    • J. Serror et al., "Impact of Paging Channel Overloads or Attacks on a Cellular Network," in ACM Workshop on Wireless Security (WiSe), 2006.
    • (2006) ACM Workshop on Wireless Security (WiSe)
    • Serror, J.1
  • 35
    • 61449199429 scopus 로고    scopus 로고
    • Mitigating attacks on open functionality in SMS-capable cellular networks
    • P. Traynor et al., "Mitigating Attacks on Open Functionality in SMS-capable Cellular Networks," IEEE/ACM Trans. Netw., vol. 17, no. 1, 2009.
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.1
    • Traynor, P.1
  • 36
    • 67049128150 scopus 로고    scopus 로고
    • Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery
    • R. Racic et al., "Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery," in Security and Privacy in Comm. Networks (SecureComm), 2006.
    • (2006) Security and Privacy in Comm. Networks (SecureComm)
    • Racic, R.1
  • 37
    • 85177680134 scopus 로고    scopus 로고
    • 3rd generation partnership project; technical specification group services and system aspects; 3G security; security principles and objectives (Release 4)
    • 3GPP Mar.
    • 3GPP, "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G security; Security principles and objectives (Release 4)," 3rd Generation Partnership Project (3GPP), Tech. Rep., Mar. 2001.
    • (2001) 3rd Generation Partnership Project (3GPP), Tech. Rep.
  • 38
    • 85177664918 scopus 로고    scopus 로고
    • Comprehensive analysis of UMTS authentication and key agreement
    • M. Hassan et al., "Comprehensive Analysis of UMTS Authentication and Key Agreement," International Journal of Computer and Network Security, vol. 2, no. 2, 2010.
    • (2010) International Journal of Computer and Network Security , vol.2 , Issue.2
    • Hassan, M.1
  • 41
    • 68449104742 scopus 로고    scopus 로고
    • On the detection of signaling DoS attacks on 3G/WiMax wireless networks
    • P. P. C. Lee et al., "On the Detection of Signaling DoS Attacks on 3G/WiMax Wireless Networks," Comput. Netw., vol. 53, no. 15, 2009.
    • (2009) Comput. Netw. , vol.53 , Issue.15
    • Lee, P.P.C.1
  • 43
  • 44
    • 32444432722 scopus 로고    scopus 로고
    • Partitioning attacks: Or how to rapidly clone some GSM cards
    • J. R. Rao et al., "Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards," in IEEE Symposium on Security and Privacy, 2002.
    • (2002) IEEE Symposium on Security and Privacy
    • Rao, J.R.1
  • 48
    • 74049108559 scopus 로고    scopus 로고
    • On cellular botnets: Measuring the impact of malicious devices on a cellular network core
    • P. Traynor et al., "On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core," in ACM Conference on Computer and Communications Security (CCS), 2009.
    • (2009) ACM Conference on Computer and Communications Security (CCS)
    • Traynor, P.1
  • 49
    • 33750358907 scopus 로고    scopus 로고
    • Malicious actions against the GPRS technology
    • C. Xenakis, "Malicious Actions against the GPRS Technology." Journal in Computer Virology, vol. 2, no. 2, 2006.
    • (2006) Journal in Computer Virology , vol.2 , Issue.2
    • Xenakis, C.1
  • 51
    • 85177638390 scopus 로고    scopus 로고
    • Symantec Security Response, "Androi-dOS. Tapsnake: Watching Your Every Move," 2010, http://www.symantec.com/connect/blogs/androidostapsnake- watching-your-every-move.
    • (2010) Androi-dOS. Tapsnake: Watching Your Every Move
  • 52
    • 85177700576 scopus 로고    scopus 로고
    • N. Seriot, "SpyPhone," 2010, "https://github.com/nst/ spyphone/".
    • (2010) SpyPhone
    • Seriot, N.1
  • 55
    • 70350423437 scopus 로고    scopus 로고
    • The underground economy: Priceless
    • Dec
    • R. Thomas and J. Martin, "The Underground Economy: Priceless," USENIX; login:, vol. 31, no. 6, Dec 2006.
    • (2006) USENIX; login , vol.31 , Issue.6
    • Thomas, R.1    Martin, J.2
  • 56
  • 60
    • 79958851198 scopus 로고    scopus 로고
    • Design of SMS commanded-and-controlled and P2P-structured mobile botnets
    • Y. Zeng et al., "Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets," University of Michigan, Tech. Rep. CSE-TR-562-10, 2010.
    • (2010) University of Michigan, Tech. Rep. CSE-TR-562-10
    • Zeng, Y.1
  • 62
    • 33746632334 scopus 로고    scopus 로고
    • Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
    • F. C. Freiling et al., "Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks," in European Conference on Research in Computer Security (ESORICS), 2005.
    • (2005) European Conference on Research in Computer Security (ESORICS)
    • Freiling, F.C.1
  • 66
    • 85177634086 scopus 로고    scopus 로고
    • OMTP Limited Oct.
    • OMTP Limited, "Browser," Oct. 2007.
    • (2007) Browser
  • 68
    • 80052020585 scopus 로고    scopus 로고
    • PDA attacks, Part 2: Airborne viruses - Evolution of the latest threats
    • Oct.
    • C. Peikari, "PDA Attacks, Part 2: Airborne Viruses - Evolution of the Latest Threats," (IN)SECURE Magazine, vol. 4, Oct. 2005.
    • (2005) (IN)Secure Magazine , vol.4
    • Peikari, C.1
  • 72
    • 85177648459 scopus 로고    scopus 로고
    • SymbOS malware classification problems
    • Aug.
    • V. Bontchev, "SymbOS Malware Classification Problems," in Virus Bulletin Conference, Aug. 2006.
    • (2006) Virus Bulletin Conference
    • Bontchev, V.1
  • 73
    • 85177694444 scopus 로고    scopus 로고
    • McAfee, "Mobile Security Report," 2008, http://www.mcafee.com/ us/localcontent/reports/mcafeemobilesecurityreport2008.pdf.
    • (2008) Mobile Security Report
  • 82
    • 85177680821 scopus 로고    scopus 로고
    • This is not the droid you're looking for⋯
    • Aug.
    • N. J. Percoco and C. Papathanasiou, "This is not the Droid you're looking for⋯" in Defcon 18, Aug. 2010.
    • (2010) Defcon 18
    • Percoco, N.J.1    Papathanasiou, C.2
  • 85
    • 78651527844 scopus 로고    scopus 로고
    • An analysis of the robustness and stability of the network stack in symbian-based smartphones
    • S. M. Habib et al., "An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones," Journal of Networks, vol. 4, no. 10, 2009.
    • (2009) Journal of Networks , vol.4 , Issue.10
    • Habib, S.M.1
  • 92
    • 85084161247 scopus 로고    scopus 로고
    • Why johnny can't encrypt: A usability evaluation of PGP 5.0
    • A. Whitten and J. D. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," in USENIX Security Symposium, 1999.
    • (1999) USENIX Security Symposium
    • Whitten, A.1    Tygar, J.D.2
  • 93
    • 32444433117 scopus 로고    scopus 로고
    • The challenges of understanding and using security: A survey of end-users
    • S. Furnell et al., "The Challenges of Understanding and Using Security: A Survey of End-Users," Computers & Security, vol. 25, no. 1, 2006.
    • (2006) Computers & Security , vol.25 , Issue.1
    • Furnell, S.1
  • 96
    • 19944387279 scopus 로고    scopus 로고
    • Why users cannot use security
    • S. Furnell, "Why Users Cannot Use Security," Computers & Security, vol. 24, no. 4, 2005.
    • (2005) Computers & Security , vol.24 , Issue.4
    • Furnell, S.1
  • 97
    • 34547950128 scopus 로고    scopus 로고
    • Making security usable: Are things improving?
    • -, "Making Security Usable: Are Things Improving?" Computers & Security, vol. 26, no. 6, 2007.
    • (2007) Computers & Security , vol.26 , Issue.6
    • Furnell, S.1
  • 98
    • 27644560483 scopus 로고    scopus 로고
    • The state of security
    • P. Kuper, "The State of Security," IEEE Security & Privacy, vol. 3, no. 5, 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.5
    • Kuper, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.