{"title":"当移动比固定更难时(反之亦然):揭开移动环境中的安全挑战的神秘面纱","authors":"Jon Oberheide, F. Jahanian","doi":"10.1145/1734583.1734595","DOIUrl":null,"url":null,"abstract":"Sophisticated consumer mobile devices continue to approach the capabilities and extensibility of traditional computing environments. Unfortunately, these new capabilities and applications make mobile devices an enticing target for attackers and malicious software. Due to such threats, the domain of mobile security has been getting a considerable amount of attention. However, current approaches have failed to consider key differences and their practical impact on the security of modern platforms when adopting techniques from non-mobile (or \"fixed\") environments. To help demystify mobile security and guide future research, we examine the unique challenges of mobile environments ranging from hardware to software to usability, delve in the diverse security models of current mobile platforms, and present our five commandments of mobile security research.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"26 1","pages":"43-48"},"PeriodicalIF":0.0000,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"99","resultStr":"{\"title\":\"When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments\",\"authors\":\"Jon Oberheide, F. Jahanian\",\"doi\":\"10.1145/1734583.1734595\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Sophisticated consumer mobile devices continue to approach the capabilities and extensibility of traditional computing environments. Unfortunately, these new capabilities and applications make mobile devices an enticing target for attackers and malicious software. Due to such threats, the domain of mobile security has been getting a considerable amount of attention. However, current approaches have failed to consider key differences and their practical impact on the security of modern platforms when adopting techniques from non-mobile (or \\\"fixed\\\") environments. To help demystify mobile security and guide future research, we examine the unique challenges of mobile environments ranging from hardware to software to usability, delve in the diverse security models of current mobile platforms, and present our five commandments of mobile security research.\",\"PeriodicalId\":88972,\"journal\":{\"name\":\"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications\",\"volume\":\"26 1\",\"pages\":\"43-48\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-02-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"99\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1734583.1734595\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1734583.1734595","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments
Sophisticated consumer mobile devices continue to approach the capabilities and extensibility of traditional computing environments. Unfortunately, these new capabilities and applications make mobile devices an enticing target for attackers and malicious software. Due to such threats, the domain of mobile security has been getting a considerable amount of attention. However, current approaches have failed to consider key differences and their practical impact on the security of modern platforms when adopting techniques from non-mobile (or "fixed") environments. To help demystify mobile security and guide future research, we examine the unique challenges of mobile environments ranging from hardware to software to usability, delve in the diverse security models of current mobile platforms, and present our five commandments of mobile security research.