{"title":"Just-on-Time Data Leakage Protection for Mobile Devices","authors":"Bo-heung Chung, Young-ho Kim, Ki-young Kim","doi":"10.1109/ICACT.2008.4494160","DOIUrl":null,"url":null,"abstract":"Illegal outflow of important data in a mobile device is a sensitive and main issue in mobile security. Within restricted resources such as small memory size and low battery capacity, it is need too much effort to defense this through the network. In this paper, we discuss a protection technique with minimum cost in the two aspects. When at the moment of a user really use the device, outbound traffic of a user can be observed by each user, all outbound traffic doesn't need to inspect as suspicious traffic. For inspecting a suspicious traffic, it doesn't need to prepare not whole pattern string set but a part of pattern string set. With the help of this technique, it has advantages that illegal outflow in a mobile device can be protected and prohibited effectively and a mobile device can be managed securely within low battery power consumption.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"367 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 10th International Conference on Advanced Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACT.2008.4494160","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Illegal outflow of important data in a mobile device is a sensitive and main issue in mobile security. Within restricted resources such as small memory size and low battery capacity, it is need too much effort to defense this through the network. In this paper, we discuss a protection technique with minimum cost in the two aspects. When at the moment of a user really use the device, outbound traffic of a user can be observed by each user, all outbound traffic doesn't need to inspect as suspicious traffic. For inspecting a suspicious traffic, it doesn't need to prepare not whole pattern string set but a part of pattern string set. With the help of this technique, it has advantages that illegal outflow in a mobile device can be protected and prohibited effectively and a mobile device can be managed securely within low battery power consumption.