Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
With he rapid development of the mobile Internet industry, information security based on trusted computing is also becoming increasingly serious. Considering that most of the existing research is based on the static security measure, and based on the server and PC side, a security operation environment measurement framework based on mobile terminal is proposed in this paper to alleviate the information...
Android is one of the most popular operating systems on mobile devices, and its usage is not going to decrease anytime soon. Although Android security has already been widely studied in the literature, its quick evolution scheme and emerging usages call for the continuation of this common effort.In particular, mobile devices are now commonly used in different contexts, like in a bring-your-own device...
In today's cloud centred business environment, security of cloud solutions is a critical issue. Since virtualization is the foundational element of cloud computing and helps to achieve the benefits of cloud computing, security from virtualization becomes a major goal for the cloud based systems. Virtualization aims to create virtual versions of resources such as processors, memory, storage, network...
With the growing popularity of cloud-leveraged infrastructure and services, the creation and operation of multiple virtualized boxes over a single physical box is increasing rapidly. It is however becoming difficult to maintain transport performance and security with an increasing number of inter-connections among them. To address this issue, in this paper, we utilize the eBPF-based packet tracing...
Usually, most of the data generated in real-world such as images, speech signals, or fMRI scans has a high dimensionality. Therefore, dimensionality reduction techniques can be used to reduce the number of variables in that data and then the system performance can be improved. Because the processing of the high dimensional data leads the increase of complexity both in execution time and memory usage...
The rapid-iteration, web-style update cycle of Android helps fix revealed security vulnerabilities for its latest version. However, such security enhancements are usually only available for few Android devices released by certain manufacturers (e.g., Google's official Nexus devices). More manufactures choose to stop providing system update service for their obsolete models, remaining millions of vulnerable...
Alongside the fast development of new science and innovation, the elements of Smart gadgets like Smart Phones, Smart TV, smart watches smart home appliances, IoT devices etc. turn out to be increasingly powerful and are playing a basic part in the day today world. Operating systems like Android, iOS, Windows, Blackberry so on gives an operating environment for the Smart devices [1]. Android, a Linux...
Virtual machine introspection (VMI) is a critical functionality for cloud management because of the capability of security monitoring. Recently, a concept of writable VMI was proposed to update the state of guest OS from out-of-VM, which is suitable for an automated cloud management due to the feature of high automation. However, current solution of writable VMI lacks practicability because it has...
Codes that aim to detect any error regardless of its multiplicity are referred to as security oriented codes. Most of these codes are designed to protect uniformly distributed codewords; there are few solutions which are used in protecting systems with non-uniformly distributed words. The paper introduces a new encoding method, termed “Level-Out encoding”, for cases in which some words are more likely...
Support Vector Machines (SVM) is a widely used technique for classifying high-dimensional data, especially in security and intelligence categorization. However, the performance of SVM can be adversely affected by poorly selected parameter values. Current approaches to SVM parameter selection mainly rely on extensive cross validation or anecdotal information, which can be inefficient and ineffective...
The security architecture and distribution of iOS was introduced. The threats to user's data security and privacy from iOS malicious applications were analyzed. The reasons that the number of iOS malicious applications is less than Android malicious applications were discussed. The attacking methods of emerging iOS malicious applications were summed up. And prospect for future mitigation and confrontation...
Network firewall rules are usually written by administrators or automated intrusion detection systems and often contain inconsistencies. Therefore, it is fundamental to ensure that only an absolutely correct configuration is active. In this paper, we design an open source conflict resolution framework (C application and Linux firewall kernel module on top of netfilter) that can be used as a constant...
A Building Automation System (BAS) is a complex distributed Cyber-Physical System that controls building functionalities such as heating, ventilation, and air conditioning (HVAC), lighting, access, emergency control, and so on. There is a growing opportunity and motivation for BAS to be integrated into enterprise IT networks together with various new "smart" technologies to improve occupant...
Applications for data analysis of biomedical data are complex programs and often consist of multiple components. Re-usage of existing solutions from external code repositories or program libraries is common in algorithm development. To ease reproducibility as well as transfer of algorithms and required components into distributed infrastructures Linux containers are increasingly used in those environments,...
The fast evolution of mobile devices has made them the center of attention for not only the research industry, but also malicious actors, as smartphones are used to store, transmit and process sensitive information. The diversity and number of typically installed applications create windows of opportunity for attackers. Attackers can use vulnerable applications to gain control over the device or change...
The ecosystem of open source software (OSS) has been growing considerably in size. In addition, code clones - code fragments that are copied and pasted within or between software systems - are also proliferating. Although code cloning may expedite the process of software development, it often critically affects the security of software because vulnerabilities and bugs can easily be propagated through...
In this preliminary study we present thefirst practical attack on a modern smartphone whichis mounted through a malicious aftermarket replace-ment part (specifically, a replacement touchscreen). Our attack exploits the lax security checks on thepackets traveling between the touchscreen's embed-ded controller and the phone's main CPU, and isable to achieve kernel-level code execution privilegeson modern...
In recent years, cloud computing is increasingly abstracting away the operating system, allowing developers to focus higher up the stack on applications, not infrastructure. In this position paper, we analyzed the deficiencies of the traditional operating systems in the cloud environment and the features of existing cloud operating systems. We have proposed an operating system architecture for cloud...
Virtualization based memory isolation has been widely used as a security primitive in many security systems. This paper firstly provides an in-depth analysis of its effectiveness in the multicore setting, a first in the literature. Our study reveals that memory isolation by itself is inadequate for security. Due to the fundamental design choices in hardware, it faces several challenging issues including...
As more sophisticated services are increasingly offered by the OS kernel on mobile devices, the security and sensitivity of kernel data that they depend on are becoming a critical issue. Data isolation has emerged as a key technique that can address the issue by providing strong protection for sensitive kernel data. However, existing data isolation mechanisms for mobile devices all incur non-negligible...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.