D. Lubensky, Marco Pistoia, Ching-Yung Lin, Omer Tripp
{"title":"认知移动安全:特邀会议主题演讲","authors":"D. Lubensky, Marco Pistoia, Ching-Yung Lin, Omer Tripp","doi":"10.1145/2897073.2897077","DOIUrl":null,"url":null,"abstract":"Mobile devices carry a number of vulnerabilities that, when exploited, can result in proprietary-data leakage, data alteration, fraudulent transactions and, in extreme cases, physical damage to the user and surroundings. Such attacks can be instigated by both outsiders and insiders, and can leverage vulnerabilities embedded in the hardware and software components of the device, as well as risky behavioral actions undertaken by the legitimate user of the device. Existing mobile security management solutions offer a wide range of configuration, tracking, and management features via device and container management, policy-based configuration, single sign-on, application whitelisting and/or blacklisting, as well as reputation and anti-malware services. A primary feature that none of the existing solutions has is \\emph{context-aware anomaly detection}. We propose a novel cognitive solution for mobile security based on context awareness. Our solution focuses on mobile management tools that understand long-term context-aware behavior anomalies on multiple devices.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cognitive Mobile Security: Invited Conference Keynote\",\"authors\":\"D. Lubensky, Marco Pistoia, Ching-Yung Lin, Omer Tripp\",\"doi\":\"10.1145/2897073.2897077\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile devices carry a number of vulnerabilities that, when exploited, can result in proprietary-data leakage, data alteration, fraudulent transactions and, in extreme cases, physical damage to the user and surroundings. Such attacks can be instigated by both outsiders and insiders, and can leverage vulnerabilities embedded in the hardware and software components of the device, as well as risky behavioral actions undertaken by the legitimate user of the device. Existing mobile security management solutions offer a wide range of configuration, tracking, and management features via device and container management, policy-based configuration, single sign-on, application whitelisting and/or blacklisting, as well as reputation and anti-malware services. A primary feature that none of the existing solutions has is \\\\emph{context-aware anomaly detection}. We propose a novel cognitive solution for mobile security based on context awareness. Our solution focuses on mobile management tools that understand long-term context-aware behavior anomalies on multiple devices.\",\"PeriodicalId\":296509,\"journal\":{\"name\":\"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2897073.2897077\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2897073.2897077","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cognitive Mobile Security: Invited Conference Keynote
Mobile devices carry a number of vulnerabilities that, when exploited, can result in proprietary-data leakage, data alteration, fraudulent transactions and, in extreme cases, physical damage to the user and surroundings. Such attacks can be instigated by both outsiders and insiders, and can leverage vulnerabilities embedded in the hardware and software components of the device, as well as risky behavioral actions undertaken by the legitimate user of the device. Existing mobile security management solutions offer a wide range of configuration, tracking, and management features via device and container management, policy-based configuration, single sign-on, application whitelisting and/or blacklisting, as well as reputation and anti-malware services. A primary feature that none of the existing solutions has is \emph{context-aware anomaly detection}. We propose a novel cognitive solution for mobile security based on context awareness. Our solution focuses on mobile management tools that understand long-term context-aware behavior anomalies on multiple devices.