From mobile phones to responsible devices

被引:3
|
作者
Traynor, Patrick [1 ]
Amrutkar, Chaitrali [1 ]
Rao, Vikhyath [2 ]
Jaeger, Trent [2 ]
McDaniel, Patrick [2 ]
La Porta, Thomas [2 ]
机构
[1] Georgia Inst Technol, Sch Comp Sci, Atlanta, GA 30332 USA
[2] Penn State Univ, Syst & Internet Infrastruct Secur Lab, University Pk, PA 16802 USA
基金
美国国家科学基金会;
关键词
cellular security; mobile phones; vulnerability analysis;
D O I
10.1002/sec.218
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile phones have evolved from simple voice terminals into highly-capable, general-purpose computing platforms. While people are becoming increasingly more dependent on such devices to perform sensitive operations, protect secret data, and be available for emergency use, it is clear that phone operating systems are not ready to become mission-critical systems. Through a pair of vulnerabilities and a simulated attack on a cellular network, we demonstrate that there are a myriad of unmanaged mechanisms on mobile phones, and that control of these mechanisms is vital to achieving reliable use. Through such vectors, mobile phones introduce a variety of new threats to their own applications and the telecommunications infrastructure itself. In this paper, we examine the requirements for providing effective mediation and access control for mobile phones. We then discuss the convergence of cellular networks with the Internet and its impact on effective resource management and quality of service. Based on these results, we argue for user devices that enable predictable behavior in a network-where their trusted computing bases can protect key applications and create predictable network impact. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:719 / 726
页数:8
相关论文
共 50 条
  • [1] Cell Phones as Mobile Computing Devices
    Wong, Angus K. Y.
    IT PROFESSIONAL, 2010, 12 (03) : 40 - 45
  • [2] Mobile phones as computing devices: The viruses are coming!
    Dagon, D
    Martin, T
    Starner, T
    IEEE PERVASIVE COMPUTING, 2004, 3 (04) : 11 - 15
  • [3] An update on mobile phones interference with medical devices
    Pashazadeh, Ali Mahmoud
    Aghajani, Mahdi
    Nabipour, Iraj
    Assadi, Majid
    RADIATION PROTECTION DOSIMETRY, 2013, 156 (04) : 401 - 406
  • [4] Mobile phones as lekking devices among human males
    Lycett, JE
    Dunbar, RIM
    HUMAN NATURE-AN INTERDISCIPLINARY BIOSOCIAL PERSPECTIVE, 2000, 11 (01): : 93 - 104
  • [5] Piezoelectric devices Talk could power mobile phones
    Turley, Andrew
    CHEMISTRY & INDUSTRY, 2009, (01) : 8 - 8
  • [6] Mobile phones will become the primary personal computing devices
    Barton, John J.
    Zhai, Shumin
    Cousins, Steve B.
    SEVENTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS & APPLICATIONS, PROCEEDINGS, 2006, : 3 - +
  • [7] Mobile phones as lekking devices among human males
    J. E. Lycett
    R. I. M. Dunbar
    Human Nature, 2000, 11 : 93 - 104
  • [8] High-frequency semiconductor devices for mobile phones
    Kusano, Chushiro
    Adachi, Tetsuaki
    Endo, Takefumi
    Sudo, Shigeyuki
    Hitachi Review, 1999, 48 (02): : 74 - 80
  • [9] Mobile phones as medical devices in mental disorder treatment: an overview
    Franz Gravenhorst
    Amir Muaremi
    Jakob Bardram
    Agnes Grünerbl
    Oscar Mayora
    Gabriel Wurzer
    Mads Frost
    Venet Osmani
    Bert Arnrich
    Paul Lukowicz
    Gerhard Tröster
    Personal and Ubiquitous Computing, 2015, 19 : 335 - 353
  • [10] Mobile phones as medical devices in mental disorder treatment: an overview
    Gravenhorst, Franz
    Muaremi, Amir
    Bardram, Jakob
    Gruenerbl, Agnes
    Mayora, Oscar
    Wurzer, Gabriel
    Frost, Mads
    Osmani, Venet
    Arnrich, Bert
    Lukowicz, Paul
    Troester, Gerhard
    PERSONAL AND UBIQUITOUS COMPUTING, 2015, 19 (02) : 335 - 353