[go: up one dir, main page]

Qi et al., 2017 - Google Patents

Construction and mitigation of user-behavior-based covert channels on smartphones

Qi et al., 2017

Document ID
8616878602109042784
Author
Qi W
Ding W
Wang X
Jiang Y
Xu Y
Wang J
Lu K
Publication year
Publication venue
IEEE Transactions on Mobile Computing

External Links

Snippet

To protect user privacy, many smartphone systems adopt the permission-based mechanism in which a user can evaluate the risk of requests for private information from a mobile app before installing it. However, recent studies show that the permission based mechanism is …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Sikder et al. A survey on sensor-based threats and attacks to smart devices and applications
Sikder et al. A survey on sensor-based threats to internet-of-things (iot) devices and applications
Spreitzer et al. Systematic classification of side-channel attacks: A case study for mobile devices
Qi et al. Construction and mitigation of user-behavior-based covert channels on smartphones
US10417413B2 (en) Context-aware intrusion detection method for smart devices with sensors
Al-Haiqi et al. A New Sensors‐Based Covert Channel on Android
Lin et al. Screenmilker: How to Milk Your Android Screen for Secrets.
EP3207680B1 (en) Method and device for using behavioral analysis towards efficient continuous authentication
Zhang et al. Leave me alone: App-level protection against runtime information gathering on android
Owusu et al. Accessory: password inference using accelerometers on smartphones
Simon et al. Pin skimmer: inferring pins through the camera and microphone
Yan et al. A study on power side channels on mobile devices
Fernandes et al. Android ui deception revisited: Attacks and defenses
Mohamed et al. Smashed: Sniffing and manipulating android sensor data for offensive purposes
Matyunin et al. Magneticspy: Exploiting magnetometer in mobile devices for website and application fingerprinting
Lalande et al. Hiding privacy leaks in android applications using low-attention raising covert channels
Mayrhofer et al. Adversary models for mobile device authentication
Al-Haiqi et al. On the best sensor for keystrokes inference attack on android
Shrestha et al. Slogger: Smashing motion-based touchstroke logging with transparent system noise
Guerar et al. Securing PIN‐based authentication in smartwatches with just two gestures
Guri Power-supplay: Leaking sensitive data from air-gapped, audio-gapped systems by turning the power supplies into speakers
Ying et al. Attacks and defence on android free floating windows
Urbanski et al. Detecting local covert channels using process activity correlation on android smartphones
Shrestha et al. Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware
Qi et al. Privacy leaks when you play games: A novel user-behavior-based covert channel on smartphones