{"title":"窥探智能手机、云服务及其安全性","authors":"John C.S. Lui","doi":"10.1145/2491266.2491278","DOIUrl":null,"url":null,"abstract":"As we embrace new technologies and services like smartphones and cloud services, we also need to understand various \"security pitfalls\". In this talk, I will go over the background on Android smartphones, some of the security issues and also, how malware writers can take advantages of the platform to launch new and stealthy mobile attacks.","PeriodicalId":237435,"journal":{"name":"MCC '13","volume":"29 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A peek into smartphones, cloud services and their security\",\"authors\":\"John C.S. Lui\",\"doi\":\"10.1145/2491266.2491278\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As we embrace new technologies and services like smartphones and cloud services, we also need to understand various \\\"security pitfalls\\\". In this talk, I will go over the background on Android smartphones, some of the security issues and also, how malware writers can take advantages of the platform to launch new and stealthy mobile attacks.\",\"PeriodicalId\":237435,\"journal\":{\"name\":\"MCC '13\",\"volume\":\"29 2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-08-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MCC '13\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2491266.2491278\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MCC '13","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2491266.2491278","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A peek into smartphones, cloud services and their security
As we embrace new technologies and services like smartphones and cloud services, we also need to understand various "security pitfalls". In this talk, I will go over the background on Android smartphones, some of the security issues and also, how malware writers can take advantages of the platform to launch new and stealthy mobile attacks.