Qi et al., 2017 - Google Patents
Construction and mitigation of user-behavior-based covert channels on smartphonesQi et al., 2017
- Document ID
- 8616878602109042784
- Author
- Qi W
- Ding W
- Wang X
- Jiang Y
- Xu Y
- Wang J
- Lu K
- Publication year
- Publication venue
- IEEE Transactions on Mobile Computing
External Links
Snippet
To protect user privacy, many smartphone systems adopt the permission-based mechanism in which a user can evaluate the risk of requests for private information from a mobile app before installing it. However, recent studies show that the permission based mechanism is …
- 230000000116 mitigating 0 title abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sikder et al. | A survey on sensor-based threats and attacks to smart devices and applications | |
Sikder et al. | A survey on sensor-based threats to internet-of-things (iot) devices and applications | |
Spreitzer et al. | Systematic classification of side-channel attacks: A case study for mobile devices | |
Qi et al. | Construction and mitigation of user-behavior-based covert channels on smartphones | |
US10417413B2 (en) | Context-aware intrusion detection method for smart devices with sensors | |
Al-Haiqi et al. | A New Sensors‐Based Covert Channel on Android | |
Lin et al. | Screenmilker: How to Milk Your Android Screen for Secrets. | |
EP3207680B1 (en) | Method and device for using behavioral analysis towards efficient continuous authentication | |
Zhang et al. | Leave me alone: App-level protection against runtime information gathering on android | |
Owusu et al. | Accessory: password inference using accelerometers on smartphones | |
Simon et al. | Pin skimmer: inferring pins through the camera and microphone | |
Yan et al. | A study on power side channels on mobile devices | |
Fernandes et al. | Android ui deception revisited: Attacks and defenses | |
Mohamed et al. | Smashed: Sniffing and manipulating android sensor data for offensive purposes | |
Matyunin et al. | Magneticspy: Exploiting magnetometer in mobile devices for website and application fingerprinting | |
Lalande et al. | Hiding privacy leaks in android applications using low-attention raising covert channels | |
Mayrhofer et al. | Adversary models for mobile device authentication | |
Al-Haiqi et al. | On the best sensor for keystrokes inference attack on android | |
Shrestha et al. | Slogger: Smashing motion-based touchstroke logging with transparent system noise | |
Guerar et al. | Securing PIN‐based authentication in smartwatches with just two gestures | |
Guri | Power-supplay: Leaking sensitive data from air-gapped, audio-gapped systems by turning the power supplies into speakers | |
Ying et al. | Attacks and defence on android free floating windows | |
Urbanski et al. | Detecting local covert channels using process activity correlation on android smartphones | |
Shrestha et al. | Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware | |
Qi et al. | Privacy leaks when you play games: A novel user-behavior-based covert channel on smartphones |