{"title":"移动设备的噩梦即将来临!","authors":"Kurt W. Derr","doi":"10.1109/PORTABLE.2007.14","DOIUrl":null,"url":null,"abstract":"Mobile computing devices (MCDs) such as personal digital assistants (PDAs), smart phones, handheld personal computers, and tablet PCs, are proliferating in the marketplace. As MCDs become more powerful and commonplace with ubiquitous connectivity, the line that currently divides these handheld devices from typical network computers will become very unclear. Bluetooth, WiFi, and cellular technologies interconnect mobile devices with other computing devices and represent vectors into the device that may be exploited by malicious persons. A malicious person can theoretically take complete control of a mobile device via wireless and use it for all kinds of illicit purposes. While some malicious codes have been reported in the literature for these devices, it is only a matter of time before these codes become as common on mobile devices as they are on desktop computers. Most people have had an experience with a virus on their desktop PC, but have not had the same experience on their smart phone. This will change. The INL is conducting research into MCD vulnerabilities and countermeasures and has developed a Web-based client server application for tracking this data. These efforts are described in this paper.","PeriodicalId":426585,"journal":{"name":"2007 IEEE International Conference on Portable Information Devices","volume":"223 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Nightmares with Mobile Devices are Just around the Corner!\",\"authors\":\"Kurt W. Derr\",\"doi\":\"10.1109/PORTABLE.2007.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile computing devices (MCDs) such as personal digital assistants (PDAs), smart phones, handheld personal computers, and tablet PCs, are proliferating in the marketplace. As MCDs become more powerful and commonplace with ubiquitous connectivity, the line that currently divides these handheld devices from typical network computers will become very unclear. Bluetooth, WiFi, and cellular technologies interconnect mobile devices with other computing devices and represent vectors into the device that may be exploited by malicious persons. A malicious person can theoretically take complete control of a mobile device via wireless and use it for all kinds of illicit purposes. While some malicious codes have been reported in the literature for these devices, it is only a matter of time before these codes become as common on mobile devices as they are on desktop computers. Most people have had an experience with a virus on their desktop PC, but have not had the same experience on their smart phone. This will change. The INL is conducting research into MCD vulnerabilities and countermeasures and has developed a Web-based client server application for tracking this data. These efforts are described in this paper.\",\"PeriodicalId\":426585,\"journal\":{\"name\":\"2007 IEEE International Conference on Portable Information Devices\",\"volume\":\"223 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-05-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE International Conference on Portable Information Devices\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PORTABLE.2007.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE International Conference on Portable Information Devices","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PORTABLE.2007.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Nightmares with Mobile Devices are Just around the Corner!
Mobile computing devices (MCDs) such as personal digital assistants (PDAs), smart phones, handheld personal computers, and tablet PCs, are proliferating in the marketplace. As MCDs become more powerful and commonplace with ubiquitous connectivity, the line that currently divides these handheld devices from typical network computers will become very unclear. Bluetooth, WiFi, and cellular technologies interconnect mobile devices with other computing devices and represent vectors into the device that may be exploited by malicious persons. A malicious person can theoretically take complete control of a mobile device via wireless and use it for all kinds of illicit purposes. While some malicious codes have been reported in the literature for these devices, it is only a matter of time before these codes become as common on mobile devices as they are on desktop computers. Most people have had an experience with a virus on their desktop PC, but have not had the same experience on their smart phone. This will change. The INL is conducting research into MCD vulnerabilities and countermeasures and has developed a Web-based client server application for tracking this data. These efforts are described in this paper.