Proceedings. IEEE Workshop on Mobile Computing Systems and Applications最新文献

筛选
英文 中文
Toward trustworthy mobile sensing 走向值得信赖的移动传感
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734592
Peter Gilbert, Landon P. Cox, Jaeyeon Jung, D. Wetherall
{"title":"Toward trustworthy mobile sensing","authors":"Peter Gilbert, Landon P. Cox, Jaeyeon Jung, D. Wetherall","doi":"10.1145/1734583.1734592","DOIUrl":"https://doi.org/10.1145/1734583.1734592","url":null,"abstract":"Commodity mobile devices have been utilized as sensor nodes in a variety of domains, including citizen journalism, mobile social services, and domestic eldercare. In each of these domains, data integrity and device-owners' privacy are first-class concerns, but current approaches to secure sensing fail to balance these properties. External signing infrastructure cannot attest to the values generated by a device's sensing hardware, while trusted sensing hardware does not allow users to securely reduce the fidelity of readings in order to preserve their privacy. In this paper we examine the challenges posed by the potentially conflicting goals of data integrity and user privacy and propose a trustworthy mobile sensing platform which leverages inexpensive commodity Trusted Platform Module (TPM) hardware.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"46 9 1","pages":"31-36"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82762182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 183
Rootkits on smart phones: attacks, implications and opportunities 智能手机上的rootkit:攻击、影响和机会
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734596
Jeffrey Bickford, Ryan O'Hare, A. Baliga, V. Ganapathy, L. Iftode
{"title":"Rootkits on smart phones: attacks, implications and opportunities","authors":"Jeffrey Bickford, Ryan O'Hare, A. Baliga, V. Ganapathy, L. Iftode","doi":"10.1145/1734583.1734596","DOIUrl":"https://doi.org/10.1145/1734583.1734596","url":null,"abstract":"Smart phones are increasingly being equipped with operating systems that compare in complexity with those on desktop computers. This trend makes smart phone operating systems vulnerable to many of the same threats as desktop operating systems.\u0000 In this paper, we focus on the threat posed by smart phone rootkits. Rootkits are malware that stealthily modify operating system code and data to achieve malicious goals, and have long been a problem for desktops. We use three example rootkits to show that smart phones are just as vulnerable to rootkits as desktop operating systems. However, the ubiquity of smart phones and the unique interfaces that they expose, such as voice, GPS and battery, make the social consequences of rootkits particularly devastating. We conclude the paper by identifying the challenges that need to be addressed to effectively detect rootkits on smart phones.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"14 1","pages":"49-54"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87947496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 121
Preserving privacy in location-based mobile social applications 在基于位置的移动社交应用中保护隐私
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734585
Krishna P. N. Puttaswamy, Ben Y. Zhao
{"title":"Preserving privacy in location-based mobile social applications","authors":"Krishna P. N. Puttaswamy, Ben Y. Zhao","doi":"10.1145/1734583.1734585","DOIUrl":"https://doi.org/10.1145/1734583.1734585","url":null,"abstract":"Location-based social applications (LBSAs) rely on the location coordinates of the users to provide services. Today, smartphones using these applications act as simple clients and send out user locations to untrusted third-party servers. These servers have the application logic to provide the service, and in the process collect large amounts of user location information over time. This design, however, is shown to be susceptible to large-scale user privacy compromises even if several location cloaking techniques are employed. In this position paper, we argue that the LBSAs should adapt an approach where the untrusted third-party servers are treated simply as encrypted data stores, and the application functionality be moved to the client devices. The location coordinates are encrypted, when shared, and can be decrypted only by the users that the data is intended for. This approach significantly improves user location privacy. We argue that this approach not only improves privacy, but it is also flexible enough to support a wide variety of location-based applications used today. In this paper, we identify the key building blocks necessary to construct the applications in this approach, give examples of using the building blocks by constructing several applications, and outline the privacy properties provided by this approach. We believe our approach provides a practical alternative design for LBSAs that is deployable today.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"51 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86186190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 129
Enabling mobile application mashups with Merlion 使用鱼尾狮启用移动应用程序混搭
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734602
Iqbal Mohomed
{"title":"Enabling mobile application mashups with Merlion","authors":"Iqbal Mohomed","doi":"10.1145/1734583.1734602","DOIUrl":"https://doi.org/10.1145/1734583.1734602","url":null,"abstract":"We present Merlion, a system that enables end-users to build custom mobile applications by creating mashups from existing desktop applications. The original application executes on a machine running remote desktop software (such as VNC server) without any modifications. Users can utilize the Merlion Designer to select relevant visual regions of the original application and create an alternate layout that is more suitable to their circumstances (e.g. taking the screen real-estate of their mobile device into account). Once the custom application has been designed, the user can utilize the Merlion Runtime (running on the user's mobile device) to interact with their custom application. Merlion can improve user productivity by simplifying user interfaces, automate repetitive actions, make applications available across different mobile form factors, and can allow applications that work on different OS platforms to operate in concert. In this paper, we describe the design of the Merlion system, details of our initial prototype, and discussion of the benefits and challenges of our approach.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"22 1","pages":"72-77"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84398597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mobile image recognition: architectures and tradeoffs 移动图像识别:架构和权衡
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734604
J. Hull, X. Liu, B. Erol, J. Graham, Jorge Moraleda
{"title":"Mobile image recognition: architectures and tradeoffs","authors":"J. Hull, X. Liu, B. Erol, J. Graham, Jorge Moraleda","doi":"10.1145/1734583.1734604","DOIUrl":"https://doi.org/10.1145/1734583.1734604","url":null,"abstract":"We argue that the most desirable architecture for mobile image recognition runs the complete algorithm on the mobile device. Alternative solutions that run the recognizer on a remote server will not be as desirable because of the delay between image capture and receipt of a result that can cause users to abandon the technique. We present a method for mobile recognition of paper documents and an application to newspapers that lets readers retrieve electronic data linked to articles, photos, and advertisements. We show that the index for a reasonable collection of daily newspapers can be downloaded in less than a minute and will fit in the memory of today's mid-range smart phones. Experimental results show that the recognition system has an overall error rate of less than 1%. We achieved a run time of 1.2 secs. per image with a collection of 140 newspaper pages on an HTC-8282 Windows Mobile phone.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"20 1","pages":"84-88"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73027897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
I am a sensor, and I approve this message 我是传感器,我同意这条信息
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734593
S. Saroiu, A. Wolman
{"title":"I am a sensor, and I approve this message","authors":"S. Saroiu, A. Wolman","doi":"10.1145/1734583.1734593","DOIUrl":"https://doi.org/10.1145/1734583.1734593","url":null,"abstract":"Despite the popularity of adding sensors to mobile devices, the readings provided by these sensors cannot be trusted. Users can fabricate sensor readings with relatively little effort. This lack of trust discourages the emergence of applications where users have an incentive to lie about their sensor readings, such as falsifying a location or altering a photo taken by the camera.\u0000 This paper presents a broad range of applications that would benefit from the deployment of trusted sensors, from participatory sensing to monitoring energy consumption. We present two design alternatives for making sensor readings trustworthy. Although both designs rely on the presence of a trusted platform module (TPM), they trade-off security guarantees for hardware requirements. While our first design is less secure, it requires no additional hardware beyond a TPM, unlike our second design. Finally, we present the privacy issues arising from the deployment of trusted sensors and we discuss protocols that can overcome them.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"36 1","pages":"37-42"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88814836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 163
Proving your location without giving up your privacy 在不泄露隐私的情况下证明你的位置
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734586
Wanying Luo, U. Hengartner
{"title":"Proving your location without giving up your privacy","authors":"Wanying Luo, U. Hengartner","doi":"10.1145/1734583.1734586","DOIUrl":"https://doi.org/10.1145/1734583.1734586","url":null,"abstract":"Although location-based applications have existed for several years, verifying the correctness of a user's claimed location is a challenge that has only recently gained attention in the research community. Existing architectures for the generation and verification of such location proofs have limited flexibility. For example, they do not support the proactive gathering of location proofs, where, at the time of acquiring a location proof, a user does not yet know for which application or service she will use this proof. Supporting proactive location proofs is challenging because these proofs might enable proof issuers to track a user or they might violate a user's location privacy by revealing more information about a user's location than strictly necessary to an application. We present six essential design goals that a flexible location proof architecture should meet. Furthermore, we introduce a location proof architecture that realizes our design goals and that includes user anonymity and location privacy as key design components, as opposed to previous proposals. Finally, we demonstrate how some of the design goals can be achieved by adopting proper cryptographic techniques.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"80 1 1","pages":"7-12"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89428410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
GurunGo: coupling personal computers and mobile devices through mobile data types GurunGo:通过移动数据类型将个人电脑和移动设备连接起来
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734600
I. González, Jason I. Hong
{"title":"GurunGo: coupling personal computers and mobile devices through mobile data types","authors":"I. González, Jason I. Hong","doi":"10.1145/1734583.1734600","DOIUrl":"https://doi.org/10.1145/1734583.1734600","url":null,"abstract":"Networked devices like desktop computers and mobile phones make it possible for people to access any of the billions of web pages available on the Internet. However, mobile devices are fundamentally different from desktop PCs in terms of input speeds, screen size, and network speeds, making it harder in practice to find information when on the go. In this paper, we introduce GurunGo, a system that monitors a person's activities on their PC for mobile data types---kinds of data likely to be useful to a person when mobile---and then proactively copies these snippets of data onto his mobile device, thus making it easier to find that information when mobile. Our initial prototype finds and extracts mobile data types from web pages that are browsed on a desktop computer, annotates it with additional relevant information, and copies it to a mobile device in the background. We discuss the design and implementation of GurunGo, as well as some of the tradeoffs and design rationale.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"9 1","pages":"66-71"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87121483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Supporting distributed private and public user interfaces in urban environments 支持城市环境中的分布式私有和公共用户界面
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734590
S. Hosio, Marko Jurmu, Hannu Kukka, J. Riekki, T. Ojala
{"title":"Supporting distributed private and public user interfaces in urban environments","authors":"S. Hosio, Marko Jurmu, Hannu Kukka, J. Riekki, T. Ojala","doi":"10.1145/1734583.1734590","DOIUrl":"https://doi.org/10.1145/1734583.1734590","url":null,"abstract":"Proliferation of large public displays in urban cityscape gives rise to applications distributed between public displays and mobile devices. However, real deployment of distributed applications on top of this new infrastructure is challenging as no commonly accepted architectural solutions exist to rely on. In this paper, we present a platform supporting distributed application user interfaces on interactive large public screens and personal mobile devices. We demonstrate the functionality and potential of our approach by presenting a deployment of the platform with multiple distributed applications in authentic setting in a city center. We found this platform feasible to deploy interactive, appealing services on top of, and a non-cost information pick-up service as the most appealing to users.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"74 2 1","pages":"25-30"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88258152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Stragglers of the herd get eaten: security concerns for GSM mobile banking applications 掉队者被吃掉:GSM移动银行应用的安全问题
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734597
Michael Paik
{"title":"Stragglers of the herd get eaten: security concerns for GSM mobile banking applications","authors":"Michael Paik","doi":"10.1145/1734583.1734597","DOIUrl":"https://doi.org/10.1145/1734583.1734597","url":null,"abstract":"The first GSM standard was published in 1989 [10], fully two decades ago. Since then, cryptanalysis has weakened or broken significant parts of the original specification. Yet many of these compromised pieces remain in common use, particularly throughout the developing world.\u0000 This state of affairs presents a significant risk given the recent proliferation of high visibility and high value targets within the branchless banking space in the developing world such as M-PESA, GCASH, mChek, and Zap, each of which makes use of SIM Toolkit (STK) security measures, but in an obfuscated manner.\u0000 This paper will present an overview of recent developments in GSM security and outline the need for increased cooperation and standardization in the face of rapidly eroding security measures currently in place for 2G GSM.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"279 1","pages":"54-59"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84660957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信