移動安全
移動安全(英語:Mobile security)或更精確的說法為行動裝置安全(英語:Mobile device security),是一種保護智慧型手機、平板電腦和筆記型電腦不用受到與無線網路相關的威脅[1],它在行動運算中變得越來越重要。而較值得關注的是,目前儲存在智慧型手機上的個人和商業資訊的安全性。
參考資料
編輯- ^ What is mobile security (wireless security)? - Definition from WhatIs.com. WhatIs.com. [2020-12-05]. (原始內容存檔於2022-03-27) (英語).
書籍
編輯- Bishop, Matt. Introduction to Computer Security. Addison Wesley Professional. 2004. ISBN 978-0-321-24744-5.
- Dunham, Ken; Abu Nimeh, Saeed; Becher, Michael. Mobile Malware Attack and Defense. Syngress Media. 2008 [2021-10-15]. ISBN 978-1-59749-298-0. (原始內容存檔於2022-04-07).
- Rogers, David. Mobile Security: A Guide for Users. Copper Horse Solutions Limited. 2013. ISBN 978-1-291-53309-5.
論文
編輯- Becher, Michael. Security of Smartphones at the Dawn of Their Ubiquitousness (PDF) (學位論文). Mannheim University. 2009 [2021-10-15]. (原始內容 (PDF)存檔於2019-04-05).
- Becher, Michael; Freiling, Felix C.; Hoffmann, Johannes; Holz, Thorsten; Uellenbeck, Sebastian; Wolf, Christopher. Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices (PDF). 2011 IEEE Symposium on Security and Privacy: 96–111. May 2011 [2021-10-15]. ISBN 978-1-4577-0147-4. doi:10.1109/SP.2011.29. (原始內容 (PDF)存檔於2014-06-29).
- Bilton, Nick. Hackers With Enigmatic Motives Vex Companies. The New York Times. 26 July 2010: 5 [2021-10-15]. (原始內容存檔於2022-06-17).
- Cai, Fangda; Chen, Hao; Wu, Yuanyi; Zhang, Yuan. AppCracker: Widespread Vulnerabilities in Userand Session Authentication in Mobile Apps (PDF) (學位論文). University of California, Davis. 2015 [2021-10-15]. (原始內容 (PDF)存檔於2021-10-26).
- Crussell, Johnathan; Gibler, Clint; Chen, Hao. Attack of the Clones: Detecting Cloned Applications on Android Markets (PDF) (學位論文). University of California, Davis. 2012 [2021-10-15]. (原始內容 (PDF)存檔於2021-10-26).
- Dagon, David; Martin, Tom; Starder, Thad. Mobile Phones as Computing Devices: The Viruses are Coming!. IEEE Pervasive Computing. October–December 2004, 3 (4): 11. S2CID 14224399. doi:10.1109/MPRV.2004.21.
- Dixon, Bryan; Mishra, Shivakant. On and Rootkit and Malware Detection in Smartphones (PDF). 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W). June–July 2010 [2021-10-15]. ISBN 978-1-4244-7728-9. (原始內容 (PDF)存檔於2016-03-03).
- Gendrullis, Timo. A real-world attack breaking A5/1 within hours. Proceedings of CHES 』08. Springer: 266–282. November 2008 [2021-10-15]. doi:10.1007/978-3-540-85053-3_17 . (原始內容存檔於2013-07-09).
- Gupta, Sugandha. Vulnebdroid: Automated Vulnerability Score Calculator for Android Applications. International Symposium on Security in Computing and Communication. Springer. 2016. doi:10.1007/978-981-10-2738-3_40.
- Guo, Chuanxiong; Wang, Helen; Zhu, Wenwu. Smart-Phone Attacks and Defenses (PDF). ACM SIGCOMM HotNets. Association for Computing Machinery, Inc. November 2004 [March 31, 2012]. (原始內容 (PDF)存檔於2014-02-22).
- Halbronn, Cedric; Sigwald, John. Vulnerabilities & iPhone Security Model (PDF). HITB SecConf 2010. 2010 [2012-04-21]. (原始內容 (PDF)存檔於2013-02-02).
- Hogben, Giles; Dekker, Marnix. Smartphones: Information security Risks, Opportunities and Recommendations for users. ENISA. December 2010 [2021-10-15]. (原始內容存檔於2015-03-31).
- Jøsang, Audun; Miralabé, Laurent; Dallot, Léonard. Vulnerability by Design in Mobile Network Security (PDF). Journal of Information Warfare (JIF). 2015, 14 (4) [2021-10-15]. ISSN 1445-3347. (原始內容 (PDF)存檔於2016-10-09).
- Malik, Jyoti. CREDROID: Android malware detection by network traffic analysis. Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing. Association for Computing Machinery, Inc.: 28–36. 2016 [2021-10-15]. doi:10.1145/2940343.2940348. (原始內容存檔於2018-11-26).
- Mickens, James W.; Noble, Brian D. Modeling epidemic spreading in mobile environments. WiSe '05 Proceedings of the 4th ACM workshop on Wireless security. Association for Computing Machinery, Inc.: 77–86. 2005 [2021-10-15]. doi:10.1145/1080793.1080806. (原始內容存檔於2019-04-05).
- Mulliner, Collin Richard. Security of Smart Phones (PDF) (M.Sc.論文). University of California, Santa Barbara. 2006 [2021-10-15]. (原始內容 (PDF)存檔於2022-01-20).
- Pandya, Vaibhav Ranchhoddas. Iphone Security Analysis (PDF) (學位論文). San Jose State University. 2008 [2021-10-15]. (原始內容 (PDF)存檔於2021-04-23).
- Raboin, Romain. La sécurité des smartphones (PDF). Symposium sur la sécurité des technologies de l'information et des communications 2009. SSTIC09. December 2009 [2021-10-15]. (原始內容 (PDF)存檔於2013-09-03) (法語).
- Racic, Radmilo; Ma, Denys; Chen, Hao. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery (PDF) (學位論文). University of California, Davis. 2006 [2021-10-15]. (原始內容 (PDF)存檔於2021-05-05).
- Roth, Volker; Polak, Wolfgang; Rieffel, Eleanor. Simple and Effective Defense Against Evil Twin Access Points. ACM SIGCOMM HotNets. 2008. ISBN 978-1-59593-814-5. doi:10.1145/1352533.1352569.
- Ruff, Nicolas. Sécurité du système Android (PDF). Symposium sur la sécurité des technologies de l'information et des communications 2011. SSTIC11. 2011 [2021-10-15]. (原始內容 (PDF)存檔於2016-03-04) (法語).
- Ruggiero, Paul; Foote, Jon. Cyber Threats to Mobile Phones (PDF) (學位論文). US-CERT. [2021-10-15]. (原始內容 (PDF)存檔於2020-04-24).
- Schmidt, Aubrey-Derrick; Schmidt, Hans-Gunther; Clausen, Jan; Yüksel, Kamer Ali; Kiraz, Osman; Camtepe, Ahmet; Albayrak, Sahin. Enhancing Security of Linux-based Android Devices (PDF). Proceedings of 15th International Linux Kongress. October 2008 [2021-10-15]. (原始內容 (PDF)存檔於2016-03-04).
- Schmidt, Aubrey-Derrick; Schmidt, Hans-Gunther; Batyuk, Leonid; Clausen, Jan Hendrik; Camtepe, Seyit Ahmet; Albayrak, Sahin. Smartphone Malware Evolution Revisited: Android Next Target? (PDF). 4th International Conference on Malicious and Unwanted Software (MALWARE). April 2009a [2010-11-30]. ISBN 978-1-4244-5786-1. (原始內容 (PDF)存檔於2012-09-03).
- Shabtai, Asaf; Fledel, Yuval; Kanonov, Uri; Elovici, Yuval; Dolev, Shlomi. Google Android: A State-of-the-Art Review of Security Mechanisms. 2009. arXiv:0912.5101v1 [cs.CR].
- Thirumathyam, Rubathas; Derawi, Mohammad O. Biometric Template Data Protection in Mobile Device Using Environment XML-database. 2010 2nd International Workshop on Security and Communication Networks (IWSCN). 2010. ISBN 978-1-4244-6938-3. (原始內容存檔於2013-02-12).
- Töyssy, Sampo; Helenius, Marko. About malicious software in smartphones. Journal in Computer Virology. 2006, 2 (2): 109–119. S2CID 9760466. doi:10.1007/s11416-006-0022-0.
外部連結
編輯- European Telecommunications Standards Institute. 3GPP Confidentiality and Integrity Algorithms & UEA1 UIA1. 2011. (原始內容存檔於2012-05-12).
- Siemens. Series M Siemens SMS DoS Vulnerability. 2010 [2021-10-15]. (原始內容存檔於2016-03-03).