The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the progress of the network and technology, the perfect combination of mobile intelligent terminal and internet, people are increasingly dependent on intelligent terminals. So, it was very necessary of a model for assessing the security performance of mobile intelligent terminals, especially to establish the objective model of the security performance of mobile intelligent terminal. In this paper,...
In Wyner wiretap II model of communication, Alice and Bob are connected by a channel that can be eavesdropped by an adversary with unlimited computation who can select a fraction of communication to view, and the goal is to provide perfect information theoretic security. Information theoretic security is increasingly important because of the threat of quantum computers that can effectively break algorithms...
The wide-spreading mobile malware has become a dreadful issue in the increasingly popular mobile networks. Most of the mobile malware relies on network interface to coordinate operations, steal users' private information, and launch attack activities. In this paper, we propose TextDroid, an effective and automated malware detection method combining natural language processing and machine learning...
Increasingly, trust has played a crucial role in the security of an IoT system from its inception to the end of its lifecycle. A device has to earn some level of trust even before it is authenticated for admission to the system. Furthermore, once the device is admitted to the system, it may behave maliciously over time; hence its behavior must be evaluated constantly in the form of trust to ensure...
To realize the vision of Internet-of-Things (IoT), numerous IoT devices have been developed for improving daily lives, in which smart home devices are among the most popular ones. Smart locks rely on smartphones to ease the burden of physical key management and keep tracking the door opening/close status, the security of which have aroused great interests from the security community. As security is...
In every existed technical tool and specific-purpose application, security must be in watch all the time. Each of these has its security implications that need to be considered specifically in order to protect all users' data and information and prevent putting them at risk. Moreover, the rapid development and spread of many technologies such as mobile networks and smart phones, IoT, smart cities,...
The app repackaging has became one of the most serious problems on Android platform nowadays. In the past, most of studies focus on the code detection, which deals with the billion opcodes, thus time consumption is expensive. Besides, it lacks the resistance to code obfuscation and hardening technology thus accuracy will easily be affected. Recently, UI-based detection was proposed. Some dynamic UI-based...
We would like to welcome you to Valencia, to attend The 2nd International Conference on Fog and Mobile Edge Computing (FMEC 2017) in Valencia, Spain from May 8 to May 11, 2017. FMEC 2017 is becoming one of the most well-known international technical conferences in the areas of Fog and Mobile Edge Computing. We are much honored to serve this year as general chairs for this conference. We are also very...
The rapid increase of Internet of Things (IoT) devices will have a significant impact on people's daily life, providing a wide range of services, such as smart lights, door locks, and cameras remotely controlled by smartphones. Remote access within the same environment or via the Internet requires effective authentication and authorization mechanisms beyond those provided by static authentication...
Satellite transmission based on IP may play important role for communication between event site and PPDR centers during large planned scenarios and disaster/unplanned ones. Geostationary SATCOM links that can be installed ad-hoc in any location present reliable and efficient way to transmit IP data even for voice communication based on VoIP. Using different mechanisms that handle multi connections...
Smartphones bring users lots of convenience by integrating all useful functions people may need. While users are spending more time on their phones, have they ever questioned of being spoofed by the phone they are interacting with? This paper conducts a thorough study of the mobile clickjacking attacks. We first present how the clickjacking attack works and the key points to remain undiscovered. Then,...
Software development requires the protection of privacy. However, a body of knowledge does not exist for the development of privacy-aware software. Based on a literature survey, this paper introduces various studies that address knowledge regarding the development of privacy-aware software, and describes the current status and future direction toward building a knowledge base for privacy-aware software...
Android smartphones are the most widespread in the world. This is the reason why attackers write code more and more aggressive in order to steal data and other important information stored in the phone. One of the most representative malware that implements the typical trojan behaviour in Android environment is the so-called Fake Installer. In this paper we use formal methods, in particular model...
RecDroid is a smartphone permission management system which provides users with a fine-grained real-time app permission control and a recommendation system regarding whether to grant the permission or not based on expert users' responses in the network. However, in such a system, malware owners may create multiple bot users to misguide the recommendation system by providing untruthful responses on...
The goal of this paper is to construct an adaptive scheme that uses combinatorial keying for heterogeneous mobile wireless sensor nodes (ACKS-HWSN). Most of the previous work in security of WSN deals with homogeneous sensor nodes (SNs). In homogeneous WSNs, all sensors have similar resources (such as memory capacity, and battery life). Many techniques designed for these networks suffer from communication...
E-government plays an increasingly significant role in our day-to-day lives. Mobile government (m-Government) is a subset and extension of electronic government e-Government comprising of an alternative channel for governments to improve governments' fundamental functions and providing information and services. This paper introduces an interactive framework for m-Government that improves governmental...
RecDroid is a smartphone permission response recommendation system which utilizes the responses from expert users in the network to help inexperienced users. However, in such system, malicious users can mislead the recommendation system by providing untruthful responses. Although detection system can be deployed to detect the malicious users, and exclude them from recommendation system, there are...
Mobile virtualization, emerging fairly recently, is considered to be a valuable way to mitigate security risks on Android devices. In this paper, we propose a lightweight Android virtualization solution based on container technology, named Condroid. Condroid includes resource isolation based on namespace feature and resource control based on cgroups feature. By leveraging them, Condroid can host several...
Based on the findings from a systematic literature review (SLR), this paper presents a ranking of the key challenges and opportunities for cloud computing services and derives key requirements of effective cloud services. Top challenges include security, quality of service (QoS), privacy and resource management and scalability, whereas top benefits include reduced computing costs, consistent QoS and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.