移动设备的噩梦即将来临!

Kurt W. Derr
{"title":"移动设备的噩梦即将来临!","authors":"Kurt W. Derr","doi":"10.1109/PORTABLE.2007.14","DOIUrl":null,"url":null,"abstract":"Mobile computing devices (MCDs) such as personal digital assistants (PDAs), smart phones, handheld personal computers, and tablet PCs, are proliferating in the marketplace. As MCDs become more powerful and commonplace with ubiquitous connectivity, the line that currently divides these handheld devices from typical network computers will become very unclear. Bluetooth, WiFi, and cellular technologies interconnect mobile devices with other computing devices and represent vectors into the device that may be exploited by malicious persons. A malicious person can theoretically take complete control of a mobile device via wireless and use it for all kinds of illicit purposes. While some malicious codes have been reported in the literature for these devices, it is only a matter of time before these codes become as common on mobile devices as they are on desktop computers. Most people have had an experience with a virus on their desktop PC, but have not had the same experience on their smart phone. This will change. The INL is conducting research into MCD vulnerabilities and countermeasures and has developed a Web-based client server application for tracking this data. These efforts are described in this paper.","PeriodicalId":426585,"journal":{"name":"2007 IEEE International Conference on Portable Information Devices","volume":"223 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Nightmares with Mobile Devices are Just around the Corner!\",\"authors\":\"Kurt W. Derr\",\"doi\":\"10.1109/PORTABLE.2007.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile computing devices (MCDs) such as personal digital assistants (PDAs), smart phones, handheld personal computers, and tablet PCs, are proliferating in the marketplace. As MCDs become more powerful and commonplace with ubiquitous connectivity, the line that currently divides these handheld devices from typical network computers will become very unclear. Bluetooth, WiFi, and cellular technologies interconnect mobile devices with other computing devices and represent vectors into the device that may be exploited by malicious persons. A malicious person can theoretically take complete control of a mobile device via wireless and use it for all kinds of illicit purposes. While some malicious codes have been reported in the literature for these devices, it is only a matter of time before these codes become as common on mobile devices as they are on desktop computers. Most people have had an experience with a virus on their desktop PC, but have not had the same experience on their smart phone. This will change. The INL is conducting research into MCD vulnerabilities and countermeasures and has developed a Web-based client server application for tracking this data. These efforts are described in this paper.\",\"PeriodicalId\":426585,\"journal\":{\"name\":\"2007 IEEE International Conference on Portable Information Devices\",\"volume\":\"223 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-05-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE International Conference on Portable Information Devices\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PORTABLE.2007.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE International Conference on Portable Information Devices","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PORTABLE.2007.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

个人数字助理(pda)、智能手机、掌上电脑、平板电脑等移动计算设备(mcd)正在市场上激增。随着mcd变得越来越强大和普遍,并且无处不在的连接,目前将这些手持设备与典型的网络计算机区分开来的界限将变得非常模糊。蓝牙、WiFi和蜂窝技术将移动设备与其他计算设备互连,并表示可能被恶意人员利用的设备向量。从理论上讲,恶意的人可以通过无线完全控制移动设备,并将其用于各种非法目的。虽然在这些设备的文献中已经报道了一些恶意代码,但这些代码在移动设备上变得像在台式计算机上一样常见只是时间问题。大多数人都有过在台式电脑上感染病毒的经历,但在智能手机上却没有同样的经历。这种情况将会改变。INL正在对MCD漏洞和对策进行研究,并开发了一个基于web的客户端服务器应用程序来跟踪这些数据。本文对这些工作进行了描述。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Nightmares with Mobile Devices are Just around the Corner!
Mobile computing devices (MCDs) such as personal digital assistants (PDAs), smart phones, handheld personal computers, and tablet PCs, are proliferating in the marketplace. As MCDs become more powerful and commonplace with ubiquitous connectivity, the line that currently divides these handheld devices from typical network computers will become very unclear. Bluetooth, WiFi, and cellular technologies interconnect mobile devices with other computing devices and represent vectors into the device that may be exploited by malicious persons. A malicious person can theoretically take complete control of a mobile device via wireless and use it for all kinds of illicit purposes. While some malicious codes have been reported in the literature for these devices, it is only a matter of time before these codes become as common on mobile devices as they are on desktop computers. Most people have had an experience with a virus on their desktop PC, but have not had the same experience on their smart phone. This will change. The INL is conducting research into MCD vulnerabilities and countermeasures and has developed a Web-based client server application for tracking this data. These efforts are described in this paper.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信