移动安全
移动安全(英语:Mobile security)或更精确的说法为移动设备安全(英语:Mobile device security),是一种保护智能手机、平板电脑和笔记本电脑不用受到与无线网络相关的威胁[1],它在移动计算中变得越来越重要。而较值得关注的是,目前存储在智能手机上的个人和商业信息的安全性。
参考资料
编辑- ^ What is mobile security (wireless security)? - Definition from WhatIs.com. WhatIs.com. [2020-12-05]. (原始内容存档于2022-03-27) (英语).
书籍
编辑- Bishop, Matt. Introduction to Computer Security. Addison Wesley Professional. 2004. ISBN 978-0-321-24744-5.
- Dunham, Ken; Abu Nimeh, Saeed; Becher, Michael. Mobile Malware Attack and Defense. Syngress Media. 2008 [2021-10-15]. ISBN 978-1-59749-298-0. (原始内容存档于2022-04-07).
- Rogers, David. Mobile Security: A Guide for Users. Copper Horse Solutions Limited. 2013. ISBN 978-1-291-53309-5.
论文
编辑- Becher, Michael. Security of Smartphones at the Dawn of Their Ubiquitousness (PDF) (学位论文). Mannheim University. 2009 [2021-10-15]. (原始内容 (PDF)存档于2019-04-05).
- Becher, Michael; Freiling, Felix C.; Hoffmann, Johannes; Holz, Thorsten; Uellenbeck, Sebastian; Wolf, Christopher. Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices (PDF). 2011 IEEE Symposium on Security and Privacy: 96–111. May 2011 [2021-10-15]. ISBN 978-1-4577-0147-4. doi:10.1109/SP.2011.29. (原始内容 (PDF)存档于2014-06-29).
- Bilton, Nick. Hackers With Enigmatic Motives Vex Companies. The New York Times. 26 July 2010: 5 [2021-10-15]. (原始内容存档于2022-06-17).
- Cai, Fangda; Chen, Hao; Wu, Yuanyi; Zhang, Yuan. AppCracker: Widespread Vulnerabilities in Userand Session Authentication in Mobile Apps (PDF) (学位论文). University of California, Davis. 2015 [2021-10-15]. (原始内容 (PDF)存档于2021-10-26).
- Crussell, Johnathan; Gibler, Clint; Chen, Hao. Attack of the Clones: Detecting Cloned Applications on Android Markets (PDF) (学位论文). University of California, Davis. 2012 [2021-10-15]. (原始内容 (PDF)存档于2021-10-26).
- Dagon, David; Martin, Tom; Starder, Thad. Mobile Phones as Computing Devices: The Viruses are Coming!. IEEE Pervasive Computing. October–December 2004, 3 (4): 11. S2CID 14224399. doi:10.1109/MPRV.2004.21.
- Dixon, Bryan; Mishra, Shivakant. On and Rootkit and Malware Detection in Smartphones (PDF). 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W). June–July 2010 [2021-10-15]. ISBN 978-1-4244-7728-9. (原始内容 (PDF)存档于2016-03-03).
- Gendrullis, Timo. A real-world attack breaking A5/1 within hours. Proceedings of CHES ’08. Springer: 266–282. November 2008 [2021-10-15]. doi:10.1007/978-3-540-85053-3_17 . (原始内容存档于2013-07-09).
- Gupta, Sugandha. Vulnebdroid: Automated Vulnerability Score Calculator for Android Applications. International Symposium on Security in Computing and Communication. Springer. 2016. doi:10.1007/978-981-10-2738-3_40.
- Guo, Chuanxiong; Wang, Helen; Zhu, Wenwu. Smart-Phone Attacks and Defenses (PDF). ACM SIGCOMM HotNets. Association for Computing Machinery, Inc. November 2004 [March 31, 2012]. (原始内容 (PDF)存档于2014-02-22).
- Halbronn, Cedric; Sigwald, John. Vulnerabilities & iPhone Security Model (PDF). HITB SecConf 2010. 2010 [2012-04-21]. (原始内容 (PDF)存档于2013-02-02).
- Hogben, Giles; Dekker, Marnix. Smartphones: Information security Risks, Opportunities and Recommendations for users. ENISA. December 2010 [2021-10-15]. (原始内容存档于2015-03-31).
- Jøsang, Audun; Miralabé, Laurent; Dallot, Léonard. Vulnerability by Design in Mobile Network Security (PDF). Journal of Information Warfare (JIF). 2015, 14 (4) [2021-10-15]. ISSN 1445-3347. (原始内容 (PDF)存档于2016-10-09).
- Malik, Jyoti. CREDROID: Android malware detection by network traffic analysis. Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing. Association for Computing Machinery, Inc.: 28–36. 2016 [2021-10-15]. doi:10.1145/2940343.2940348. (原始内容存档于2018-11-26).
- Mickens, James W.; Noble, Brian D. Modeling epidemic spreading in mobile environments. WiSe '05 Proceedings of the 4th ACM workshop on Wireless security. Association for Computing Machinery, Inc.: 77–86. 2005 [2021-10-15]. doi:10.1145/1080793.1080806. (原始内容存档于2019-04-05).
- Mulliner, Collin Richard. Security of Smart Phones (PDF) (M.Sc.论文). University of California, Santa Barbara. 2006 [2021-10-15]. (原始内容 (PDF)存档于2022-01-20).
- Pandya, Vaibhav Ranchhoddas. Iphone Security Analysis (PDF) (学位论文). San Jose State University. 2008 [2021-10-15]. (原始内容 (PDF)存档于2021-04-23).
- Raboin, Romain. La sécurité des smartphones (PDF). Symposium sur la sécurité des technologies de l'information et des communications 2009. SSTIC09. December 2009 [2021-10-15]. (原始内容 (PDF)存档于2013-09-03) (法语).
- Racic, Radmilo; Ma, Denys; Chen, Hao. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery (PDF) (学位论文). University of California, Davis. 2006 [2021-10-15]. (原始内容 (PDF)存档于2021-05-05).
- Roth, Volker; Polak, Wolfgang; Rieffel, Eleanor. Simple and Effective Defense Against Evil Twin Access Points. ACM SIGCOMM HotNets. 2008. ISBN 978-1-59593-814-5. doi:10.1145/1352533.1352569.
- Ruff, Nicolas. Sécurité du système Android (PDF). Symposium sur la sécurité des technologies de l'information et des communications 2011. SSTIC11. 2011 [2021-10-15]. (原始内容 (PDF)存档于2016-03-04) (法语).
- Ruggiero, Paul; Foote, Jon. Cyber Threats to Mobile Phones (PDF) (学位论文). US-CERT. [2021-10-15]. (原始内容 (PDF)存档于2020-04-24).
- Schmidt, Aubrey-Derrick; Schmidt, Hans-Gunther; Clausen, Jan; Yüksel, Kamer Ali; Kiraz, Osman; Camtepe, Ahmet; Albayrak, Sahin. Enhancing Security of Linux-based Android Devices (PDF). Proceedings of 15th International Linux Kongress. October 2008 [2021-10-15]. (原始内容 (PDF)存档于2016-03-04).
- Schmidt, Aubrey-Derrick; Schmidt, Hans-Gunther; Batyuk, Leonid; Clausen, Jan Hendrik; Camtepe, Seyit Ahmet; Albayrak, Sahin. Smartphone Malware Evolution Revisited: Android Next Target? (PDF). 4th International Conference on Malicious and Unwanted Software (MALWARE). April 2009a [2010-11-30]. ISBN 978-1-4244-5786-1. (原始内容 (PDF)存档于2012-09-03).
- Shabtai, Asaf; Fledel, Yuval; Kanonov, Uri; Elovici, Yuval; Dolev, Shlomi. Google Android: A State-of-the-Art Review of Security Mechanisms. 2009. arXiv:0912.5101v1 [cs.CR].
- Thirumathyam, Rubathas; Derawi, Mohammad O. Biometric Template Data Protection in Mobile Device Using Environment XML-database. 2010 2nd International Workshop on Security and Communication Networks (IWSCN). 2010. ISBN 978-1-4244-6938-3. (原始内容存档于2013-02-12).
- Töyssy, Sampo; Helenius, Marko. About malicious software in smartphones. Journal in Computer Virology. 2006, 2 (2): 109–119. S2CID 9760466. doi:10.1007/s11416-006-0022-0.
外部链接
编辑- European Telecommunications Standards Institute. 3GPP Confidentiality and Integrity Algorithms & UEA1 UIA1. 2011. (原始内容存档于2012-05-12).
- Siemens. Series M Siemens SMS DoS Vulnerability. 2010 [2021-10-15]. (原始内容存档于2016-03-03).