GetMobile Mob. Comput. Commun.最新文献

筛选
英文 中文
RFID Hacking for Fun and Profit RFID黑客的乐趣和利润
GetMobile Mob. Comput. Commun. Pub Date : 2019-07-24 DOI: 10.1145/3351422.3351430
Ju Wang, Omid Salehi-Abari, S. Keshav
{"title":"RFID Hacking for Fun and Profit","authors":"Ju Wang, Omid Salehi-Abari, S. Keshav","doi":"10.1145/3351422.3351430","DOIUrl":"https://doi.org/10.1145/3351422.3351430","url":null,"abstract":"This paper shows how even hobbyists can transform commodity RFID tags into sensors by physically altering (\"hacking\") them using COTS sensors, a pair of scissors, and clear adhesive tape or conductive epoxy glue. Importantly, this requires no change to commercial RFID readers. We also propose a signal feature, namely Differential Minimum Response Threshold (DMRT), which is robust to the changes in an RF environment for the sensing. To validate our vision, we develop RFID-based sensors for features such as illuminance, temperature, and gestures. We believe our approach can open up the field of batteryless backscatter-based RFID sensing to the research community, making it an exciting area for future work.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116509528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Open-Source Software and Hardware Platforms for Building Backscatter Systems 构建反向散射系统的开源软件和硬件平台
GetMobile Mob. Comput. Commun. Pub Date : 2019-07-24 DOI: 10.1145/3351422.3351428
Chenren Xu, Pengyu Zhang
{"title":"Open-Source Software and Hardware Platforms for Building Backscatter Systems","authors":"Chenren Xu, Pengyu Zhang","doi":"10.1145/3351422.3351428","DOIUrl":"https://doi.org/10.1145/3351422.3351428","url":null,"abstract":"In this article, we will provide a brief introduction of available opensource backscatter platforms that can be used by researchers and engineers to build interesting applications or investigate novel backscatter communication technologies. Instead of diving into the details of each platform, we will focus our discussion on the principles used in designing each platform and the unique feature provided by each platform. At the end of this article, we will discuss several key hardware and software modules that can be used by researchers or engineers to build their own backscatter platforms.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123470613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Standards for Hardware Security 硬件安全标准
GetMobile Mob. Comput. Commun. Pub Date : 2019-07-24 DOI: 10.1145/3351422.3351424
Ujjwal Guin, N. Asadizanjani, M. Tehranipoor
{"title":"Standards for Hardware Security","authors":"Ujjwal Guin, N. Asadizanjani, M. Tehranipoor","doi":"10.1145/3351422.3351424","DOIUrl":"https://doi.org/10.1145/3351422.3351424","url":null,"abstract":"Due to the globalization of design, manufacturing and distribution of integrated circuits (ICs), hardware underlying information systems have become increasingly vulnerable to a number of malicious attacks, primarily counterfeiting of ICs and piracy of intellectual properties (IPs). To ensure the security of our critical infrastructure, the use of trusted hardware is absolutely necessary. There are a handful of standards, either currently available today or in progress, that provide guidance to undertake hardware security issues. This article focuses on the standardization activity in the domain of hardware security.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127146132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol 逆向工程和评估苹果无线直连协议
GetMobile Mob. Comput. Commun. Pub Date : 2019-07-24 DOI: 10.1145/3351422.3351432
Milan Stute, David Kreitschmann, M. Hollick
{"title":"Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol","authors":"Milan Stute, David Kreitschmann, M. Hollick","doi":"10.1145/3351422.3351432","DOIUrl":"https://doi.org/10.1145/3351422.3351432","url":null,"abstract":"Apple Wireless Direct Link (AWDL) is a proprietary protocol deployed in about 1.4 billion1 end-user devices consisting of Apple's main product families such as Mac, iPhone, iPad, Apple Watch, and Apple TV? effectively all recent Apple devices containing a Wi-Fi chip. Apple does not advertise the protocol but only vaguely refers to it as a \"peer-to-peer Wi-Fi\" technology [2]. Yet, it empowers popular applications such as AirDrop and AirPlay that transparently use AWDL without the user noticing. We believe that public knowledge of this undocumented protocol would be beneficial for the following reasons.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130074316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Skycore: Moving Core to the Edge For Untethered and Reliable UAV-Based LTE Networks Skycore:将核心移动到边缘,用于无绳和可靠的基于无人机的LTE网络
GetMobile Mob. Comput. Commun. Pub Date : 2019-07-24 DOI: 10.1145/3351422.3351431
Mehrdad Moradi, K. Sundaresan, Eugene Chai, S. Rangarajan, Z. Morley Mao
{"title":"Skycore: Moving Core to the Edge For Untethered and Reliable UAV-Based LTE Networks","authors":"Mehrdad Moradi, K. Sundaresan, Eugene Chai, S. Rangarajan, Z. Morley Mao","doi":"10.1145/3351422.3351431","DOIUrl":"https://doi.org/10.1145/3351422.3351431","url":null,"abstract":"Deploying LTE networks on modern UAVs requires a redesign of the key components of the LTE architecture. In this article, we propose a radical, edge-EPC design, called SkyCore, that pushes one of its central functionalities, namely its evolved packet core (EPC) to the extreme edge of the LTE network - collapses the EPC into a single, lightweight, selfcontained entity that is co-located with each of the UAV base-stations. SkyCore incorporates elements that are designed to address the unique challenges facing such a distributed design in the UAV environment, namely the resource-constrained nature of UAV platforms, and the distributed management of UAV and user mobility. We build and deploy a fully functional SkyCore system on a multi-UAV LTE network and showcase its (i) ability to interoperate with commercial LTE basestations as well as smartphones, (ii) support for both hotspot and standalone multi-UAV deployments, and (iii) robust control and data plane performance compared to other EPC variants in this inherently dynamic, unreliable environment.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"11 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113942945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
You Can't Teach a New Phone Old Tricks: Smartphones Resist Traditional Compute Roles 你不能教新手机旧的技巧:智能手机抵制传统的计算角色
GetMobile Mob. Comput. Commun. Pub Date : 2019-07-24 DOI: 10.1145/3351422.3351433
Noah Klugman, Meghan Clark, Matthew Podolsky, P. Pannuto, Jay Taneja, P. Dutta
{"title":"You Can't Teach a New Phone Old Tricks: Smartphones Resist Traditional Compute Roles","authors":"Noah Klugman, Meghan Clark, Matthew Podolsky, P. Pannuto, Jay Taneja, P. Dutta","doi":"10.1145/3351422.3351433","DOIUrl":"https://doi.org/10.1145/3351422.3351433","url":null,"abstract":"The smartphone is an incredible computing platform. Loaded with powerful processing, vast data storage, near-global connectivity, built-in batteries, and a rich array of sensors, these devices reliably service the needs of billions of users every day. However, when tasked to run just a single application continuously without any human interaction, the smartphone platform becomes surprisingly unreliable. Over the course of a four-month deployment of Android-phone-based cellular gateways in Zanzibar, Tanzania, all 16 deployed phones failed despite significant engineering efforts, and six phones became physically damaged. This article examines what went wrong and how mobile computing platforms could adapt to support more traditional embedded computing roles and workloads.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134146307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Future of Smart Parking Systems with Parking 4.0 智能停车系统的未来与停车4.0
GetMobile Mob. Comput. Commun. Pub Date : 2019-07-24 DOI: 10.1145/3351422.3351426
P. Misra, Arunchandar Vasan, B. Krishnan, S. Venkatachari, A. Sivasubramaniam
{"title":"The Future of Smart Parking Systems with Parking 4.0","authors":"P. Misra, Arunchandar Vasan, B. Krishnan, S. Venkatachari, A. Sivasubramaniam","doi":"10.1145/3351422.3351426","DOIUrl":"https://doi.org/10.1145/3351422.3351426","url":null,"abstract":"Parking is important for mobility, access, and the economic development of cities. Evolving technology, new business opportunities, and a growing awareness are expanding the role of smart parking in sustainable city-scale mobility. The benefits from smart parking can get amplified manyfold as part of a cohesive, collaborative ecosystem. In this article, we present our vision of Parking 4.0 as a digital reimagination of the end-to-end value parking chain as part of a collaborative eco-system. We discuss the key market drivers and barriers in smart parking; assess the current readiness levels; and outline a path to Parking 4.0 while identifying opportunities and open research challenges.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115696156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Signpost: Enabling City-Scale Sensing for Citizens and Scientists 路标:为市民和科学家实现城市规模的传感
GetMobile Mob. Comput. Commun. Pub Date : 2019-01-17 DOI: 10.1145/3308755.3308763
Joshua Adkins, Branden Ghena, P. Dutta
{"title":"Signpost: Enabling City-Scale Sensing for Citizens and Scientists","authors":"Joshua Adkins, Branden Ghena, P. Dutta","doi":"10.1145/3308755.3308763","DOIUrl":"https://doi.org/10.1145/3308755.3308763","url":null,"abstract":"The world's population is flocking to city centers at an increasing rate, testing the ability of urban planners and local governments to address new problems in transportation, waste disposal, urban health, and public safety. While one could imagine solutions enabled by an emerging class of smart sensors, current attempts at such systems are difficult to deploy and single purpose in their design. If we expect researchers and citizen-scientists to participate in the data-driven rejuvenation of our urban spaces (and we should, since they are the ones experiencing the day-to-day problems), we must lower the bar to deploying sensors and accessing smart-city data. Towards this goal, we present Signpost, an infrastructurefree sensing platform that aims to enable easy, multi-use sensor deployments for citizens, and researchers who have little expertise in building smart and connected sensors.[1]","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122757583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: MAKERS 会议详情:MAKERS
GetMobile Mob. Comput. Commun. Pub Date : 2019-01-17 DOI: 10.1145/3308772
P. Dutta, Iqbal Mohomed
{"title":"Session details: MAKERS","authors":"P. Dutta, Iqbal Mohomed","doi":"10.1145/3308772","DOIUrl":"https://doi.org/10.1145/3308772","url":null,"abstract":"","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123298143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeepXplore: Automated Whitebox Testing of Deep Learning Systems deepexplore:深度学习系统的自动白盒测试
GetMobile Mob. Comput. Commun. Pub Date : 2019-01-17 DOI: 10.1145/3308755.3308767
Kexin Pei, Yinzhi Cao, Junfeng Yang, S. Jana
{"title":"DeepXplore: Automated Whitebox Testing of Deep Learning Systems","authors":"Kexin Pei, Yinzhi Cao, Junfeng Yang, S. Jana","doi":"10.1145/3308755.3308767","DOIUrl":"https://doi.org/10.1145/3308755.3308767","url":null,"abstract":"Over the past few years, Deep Learning (DL) has made tremendous progress, achieving or surpassing human-level performance for a diverse set of tasks, including image classification, speech recognition, and playing games like Go. These advances have led to widespread adoption and deployment of DL in security- and safety-critical systems, such as selfdriving cars, malware detection, and aircraft collision avoidance systems.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"646 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133171325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信