The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Energy efficient prefetching systems for smart-phones can greatly reduce energy consumption and data transmission, and maintain the timely response when information is prefetched. However, the proxy structure of the system can cause security problem to reveal private information to the third party. The end-to-end encryption (SSL) in traditional prefetching systems cannot solve the security problem...
As the increasing downloads of applications via Android Platform, more and more malicious codes were injected in those applications. And some problems are caused by that malicious code such as economic loss and privacy issues. Android has the highest market share of smartphone operating system, the security of Android platform is extremely important. Therefore, the security testing and evaluation...
Nowadays, there is an explosive growth of commercial market which is based on mobile location service. One of the notable applications of location based service (LBS) is precision marketing which has displayed its attractiveness all over the world. The core of LBS is real-time and precise positioning technology. Positioning by mobile terminals and positioning by base stations are two major solutions...
For the reason of security, the number of internet port is always been limited, this makes that computers in different LAN cannot communicate with each other by HTTP. To solve this problem, this paper put forward a new scheme based on SOCKS5. In extreme case there is only one TCP link, in order to achieve parallel communication by HTTP via the only TCP link. The first step is altering the requests...
Short Message Service (SMS) provided by the mobile communication system is a widely used service, almost all the mobile terminals support the short message protocol. In this paper, we illustrate how to exploit the SMS as an attack vector to deploy malware on Android system. Through protocol manipulation, we select the message of type Replace Short Message Type (RS MT) as the attack vector and then...
The paper designs a platform which is used for observing signaling messages. The platform can be applied in many fields, such as cellphone security, signaling teaching, malicious attack and so on. In this paper, we mainly introduce its effects in signaling teaching. A distributed GSM teaching platform is designed, which is used for helping students to study GSM Um interface protocols better. Cooperating...
Due to the openness of Android, more and more malware has exploded, and constitutes a huge security threat to Android-based smartphones. This paper proposes a mechanism to study sensitive data leakage by analyzing sensitive APIs, decompiles Android APK to get smali files, and defines a sensitive API library related to user privacy. Then, analyzes the potential threats by detecting the sensitive API...
Remote forensics is one important development direction of modern computer forensics. Interception and filtering operations are the key technologies for remote forensics, and still facing technical challenges. This article will applied mini-filter installable file system (Minifilter) technology to the remote forensics, and propose a remote forensics system using Minifilter to intercept and filter...
Whether the most important features can be extracted to reduce the dimension of the features or not is crucial to improving the efficiency and performance of the Intrusion Detection System (IDS). In this paper, an intrusion detection feature extraction method based on the complex network theory and the MST algorithm is proposed. The method takes the features of the network connections as nodes of...
This paper presents a new GSM/UMTS jamming system which is intended to be placed in a restricted area for security purpose. A pseudo base station was constructed to attempt connecting with mobile terminals. While the terminals are trying to access, the system will get the unique identity, such as IMSI and IMEI, and further check these identities in the repository. The system will selectively block...
The WAI (WLAN Authentication Infrastructure), which is composed of mutual certificate authentication and key agreement, is the authentication protocol in the Chinese Wireless LAN standard. In this paper, we analyze the WAI protocol using a finite-state verification tool Mur?? and find that the authentication protocol can't resist the denial of service attack. Attackers can forge the messages to produce...
The WAI (WLAN authentication infrastructure), is the authentication protocol in the Chinese Wireless LAN standard. This protocol, similar as 802.11i, adopts port-based access control and involves three entities in the authentication process. The three entities named in Chinese standard are ASUE (wireless device), AE (access point) and ASE (authentication server). The WAI is composed of a mutual public...
The authenticated encryption schemes can be used to provides integration, authentication, and non-repudiation for the signing message while keeping the message secret from the public. In this paper, we propose a new (t, n) threshold proxy authenticated encryption scheme, in which at least t out of n proxy signers delegated by the original signer can sign messages on behalf of the original signer....
The problem of key management in ad hoc networks was analyzed in this paper. Key management, however, can reveal information about the dynamics of ad hoc network membership, such as the group size and the number of joining and leaving users. Thus, only legitimate members have access to the messages. Once any member in the ad hoc network was going to join or leave the group, the group key would be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.