From mobile phones to responsible devices

被引:3
|
作者
Traynor, Patrick [1 ]
Amrutkar, Chaitrali [1 ]
Rao, Vikhyath [2 ]
Jaeger, Trent [2 ]
McDaniel, Patrick [2 ]
La Porta, Thomas [2 ]
机构
[1] Georgia Inst Technol, Sch Comp Sci, Atlanta, GA 30332 USA
[2] Penn State Univ, Syst & Internet Infrastruct Secur Lab, University Pk, PA 16802 USA
基金
美国国家科学基金会;
关键词
cellular security; mobile phones; vulnerability analysis;
D O I
10.1002/sec.218
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile phones have evolved from simple voice terminals into highly-capable, general-purpose computing platforms. While people are becoming increasingly more dependent on such devices to perform sensitive operations, protect secret data, and be available for emergency use, it is clear that phone operating systems are not ready to become mission-critical systems. Through a pair of vulnerabilities and a simulated attack on a cellular network, we demonstrate that there are a myriad of unmanaged mechanisms on mobile phones, and that control of these mechanisms is vital to achieving reliable use. Through such vectors, mobile phones introduce a variety of new threats to their own applications and the telecommunications infrastructure itself. In this paper, we examine the requirements for providing effective mediation and access control for mobile phones. We then discuss the convergence of cellular networks with the Internet and its impact on effective resource management and quality of service. Based on these results, we argue for user devices that enable predictable behavior in a network-where their trusted computing bases can protect key applications and create predictable network impact. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:719 / 726
页数:8
相关论文
共 50 条
  • [21] Brains and mobile phones - The biggest risk to health from mobile phones is using them while driving
    Maier, M
    BRITISH MEDICAL JOURNAL, 2006, 332 (7546): : 864 - 865
  • [23] From Mobile Phones to Personal Wellness Dashboards
    Kailas, Aravind
    Chong, Chia-Chin
    Watanabe, Fujio
    IEEE PULSE, 2010, 1 (01) : 57 - 63
  • [24] REDUCING RF ABSORPTION FROM MOBILE PHONES
    Faruque, Mohammad Rashed Iqbal
    ELECTRONICS WORLD, 2016, 122 (1962): : 44 - 46
  • [25] Defending Mobile Phones from Proximity Malware
    Zyba, Gjergji
    Voelker, Geoffrey M.
    Liljenstam, Michael
    Mehes, Andras
    Johansson, Per
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 1503 - +
  • [26] Risk of cancer from mobile phones is unclear
    White, C
    BRITISH MEDICAL JOURNAL, 2004, 328 (7432): : 124 - 124
  • [27] Contact dermatitis from nickel in mobile phones
    Pazzaglia, M
    Lucente, P
    Vincenzi, C
    Tosti, A
    CONTACT DERMATITIS, 2000, 42 (06) : 362 - 363
  • [28] Radio frequency radiation from mobile phones
    Grangeat, C
    ALCATEL TELECOMMUNICATIONS REVIEW, 1998, (04): : 298 - 304
  • [29] Home appliance control from mobile phones
    Sumino, Hiromitsu
    Uchida, Yoshitaka
    Ishikawa, Norihiro
    Tsutsui, Hiroshi
    Ochi, Hiroyuki
    Nakamura, Yukihiro
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 793 - +
  • [30] Radio frequency radiation from mobile phones
    Grangeat, C.
    Alcatel Telecommunications Review, 1998, (4 th Quarter): : 298 - 304