The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With he rapid development of the mobile Internet industry, information security based on trusted computing is also becoming increasingly serious. Considering that most of the existing research is based on the static security measure, and based on the server and PC side, a security operation environment measurement framework based on mobile terminal is proposed in this paper to alleviate the information...
The security architecture and distribution of iOS was introduced. The threats to user's data security and privacy from iOS malicious applications were analyzed. The reasons that the number of iOS malicious applications is less than Android malicious applications were discussed. The attacking methods of emerging iOS malicious applications were summed up. And prospect for future mitigation and confrontation...
In this paper, we can find the defects of the security mechanism through the analysis of the security mechanism of iOS system. And in accordance with known vulnerabilities, we achieve to exploit the loopholes, and then complete the breaking out of sandbox, Obtaining arbitrary code executio, root privilege, patching kernel. Finally we achieve to jailbreak the iOS system.
Mobile devices have become so prevalent in human's life. Mobile operating systems (MOS) will be the next big thing in operating systems to provide security protection to mobile devices. Compared to desktop operating systems, MOS are so new in their life cycle. In this paper, we present the future directions to develop MOS to protect devices and data. We also discuss approaches that could be used to...
Nowadays, contact less payment solutions with credit cards based on a mobile phone have significant advantages in transaction speed and users' convenience. Especially, for merchants, a smartphone can be one of an acceptance payment solutions because it is easy for them to use with little additional price if they could use their own smartphone as it is. However, there are still many concerns on using...
In this paper the transitive trust of TPM and the secure boot of MTM are analyzed. A scheme of secure boot for embedded system is proposed. Based on U-Boot and embedded Linux, the secure boot functions for embedded system are implemented by the integrity measurement, integrity storage and integrity reporting. This scheme can improve the security of embedded system by introducing MTM. Finally the implementation...
Android is a smart mobile terminal operating platform core on Linux. But due to its open-source software and programmable framework character, it leads the Android system vulnerable to get virus attacks. This paper has deeply researched from the Linux system security mechanism, Android-specific security mechanisms and other protection mechanisms. And on this basis, Android devices have achieved closely...
Security threats on consumer devices such as mobile phones are increasing as the software platforms become more open and complex. Therefore, hypervisors, which bring potential new secure services to embedded systems, are becoming increasingly important. In this paper, we look into how to design a hypervisor-based security architecture for an advanced mobile phone. Key security components of the architecture...
The security of mobile operating systems becomes more and more important with the increasing number and increasing use of mobile devices. With the advances in operating systems security new concepts are introduced for increasing the security of current mobile operating systems. This paper introduces a testing system for the platform security architecture (PSA) of the mobile operating system Symbian...
Since malwares in mobile devices are expected to follow the same evolution of malwares in PC environment, it seems useful to apply malware defense techniques in PC environment to mobile devices. However, the malware defense techniques have limitations in terms of energy efficiency and maintenance, so that it will be inefficient to use the techniques on mobile devices, especially if the number of mobile...
This paper aims at unveiling the real and complete structure of the Symbian S60 v3 (third edition) platform filesystem, which is considered one of the most secure and armored systems issued by Symbian Ltd. in the last two years. By analyzing the unique features of security, which have been applied at the filesystem level, it will become clear how to develop applications for digital forensic purposes...
For protection of the confidentiality and integrity of the mobile codes, this paper proposes a new decentralized label model and a implementation of this model in Linux system, MCGuard. Using MCGuard, the owners can flexibly define their security policies to control the dissemination of their mobile codes just by labelling them. By intercepting system calls, MCGuard inserts an interposition layer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.