The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, many people have used smart mobile devices tightly in their life. Most enterprises demand BYOD to maximize the efficiency such as productivity, cost savings. Although BYOD offers many benefits to enterprises, it also brings significant risks to them. Most enterprises have applied MDM solution for BYOD. However, the MDM solution cannot provide complete security. In this paper, we propose...
For enhanced secure services on smart devices, hardware-based security solutions are required. To this end, the hardware security module is required and it should be physically separated from a smart device. In this paper, we describe the considerations for applying a hardware security module on smart devices. In particular, as smart devices have a limited resource and use a battery, a hardware security...
The purpose of this study is to suggest a solution to recently emerging security threats to mobile devices and enable users to use mobile services in a secure manner. To that end, this paper presents the design and implementation method for a hardware security chip required for providing advanced mobile security services. The proposed method could be the fastest and most efficient approach among various...
While the number of smartphones increased, the security threats such as violating privacy and malicious code in smart environment increased. In general, the software security scheme is mainly used to protect mobile device from the security threat. However, this security scheme can be easily manipulated and changed. In this paper, we propose MTM hardware based mobile device security technology to prevent...
We are developing a new hardware security module based on the tamper-proof IC (Integrated Circuit) card to enhance the insufficient functions of previously known modules. The functions of our module includes platform integrity verification, cryptography management, security services such as banking, payment, etc., internal storage management, and the access control based on application integrity verification...
Recently, smart home appliances and wearable devices have been developed through many companies. Most devices can be interacted with various sensors, have communication function to connect the internet by themselves. Those devices will provide a wide range of services to users through a mutual exchange of information. However, due to the nature of the IoT environment, the appropriate security functions...
The number of smartphone users has increased rapidly. The interests of many people have grown how to prevent the leakage of security data of their enterprises. There are the technologies for using smartphone devices safely by separating the personal area and the business area. The technologies to assure security when using smartphone devices with open-platform in tight security environment such as...
Many organizations want to support Bring Your Own Device initiatives to allow end-users to use personally owned devices at work. Organizations face significant challenges as users increasingly provide their own devices for work. So, interests of many people have grown how to prevent the leakage of security data of their enterprises. There are the technologies for using smart mobile devices safely...
In various computing environments, hardware security modules are needed for protecting cryptographic keys and security services from threats of information leakage. For that protection, the modules normally have the methods of password-based access control and message encryption. Nowadays, a password itself can be easily exposed by a variety of password hacking techniques and the secure channel for...
The various services using smart mobile devices including smartphones have increased and personal smart mobile devices have utilized for the business use in many cases. There are the technologies for using smart mobile devices safely by separating the personal area and the business area such as TEE. This paper describes a MSS(Mobile Security Solution) system which is designed based on the TEE system...
Recently, the number of mobile malware is rapidly growing. In order to cope with mobile malware, the detection and response method of rooting attack is actively studied. However, the damages caused information leakage and financial charge can be occurred without rooting attack. In this paper, we have shown through experiments that it is possible to conduct DDoS attacks, privacy information leakage,...
Repackaging is the one of the most common techniques used by Android malwares. Recently, as one approach to prevent the repackaged malwares, it is considered to use the trust agency that guarantees the app developer. However, these approaches have no or limited secure channel to deploy the guaranteed apps. No secure channel poses another security issue of phishing. The limited channel through trust...
This paper presents the design and requirements of effective video encryption for intelligent surveillance systems. For this purpose, we design a new video encryption system and derive requirements for it in order to protect privacy and harm in surveillance videos.
This paper proposes an efficient hardware architecture to embody a video surveillance camera for security. The proposed smart camera will combine the Digital Media SoC with the low-cost FPGA. Each can perform video processing and security functions independently and the FPGA has a novel video security module. This security module encrypts video stream raw data by using an efficient encryption method;...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.