Download presentation
Presentation is loading. Please wait.
Published byJulia Thompson Modified over 9 years ago
1
Revealing the Nuts and Bolts of the Security of Mobile Devices Internet society to a mobile society. many articles about smartphone security were published Many researchers and practitioners are expecting a major security incident with mobile phones In March 2010, Iozzo and Weinmann demonstrated a drive of I iPhone 3GS Internet society to a mobile society. many articles about smartphone security were published Many researchers and practitioners are expecting a major security incident with mobile phones In March 2010, Iozzo and Weinmann demonstrated a drive of I iPhone 3GS
2
As a first approach, the investigation subject of this paper Any mobile device that is controlled by MNO Any kind of phones that can only be used for phone functionality USB sticks that enable laptops to use the mobile network are also not covered. Any mobile device that is controlled by MNO Any kind of phones that can only be used for phone functionality USB sticks that enable laptops to use the mobile network are also not covered.
4
Specifics of Mobile Devices Creation of costs: Billed events,payment systems Network environment:strong connection,Firmware Update Process Limited Device Resources:Resource Limitations,battery Double Expensive Wireless Link:Expensive Computation Costs, High Monetary Communication Costs Reputation Creation of costs: Billed events,payment systems Network environment:strong connection,Firmware Update Process Limited Device Resources:Resource Limitations,battery Double Expensive Wireless Link:Expensive Computation Costs, High Monetary Communication Costs Reputation
5
ATTACK VECTOR CLASSES AND ATTACK MODELS Hardware-centric attacks belong to mobile device security only from a broader point of view. In the context of this paper, the most important class of technical vulnerabilities for mobile devices are software-centric attacks. User layer attacks contain every exploit that is not of technical nature. Eavesdropping:A passive attacker tries to intercept the conversation between mobile phone and base station Availability Attacks: One possible example is an active attacker blocking the signal of the mobile phone or base station Privacy Attacks: A passive attacker might use the smartphone’s ID to locate its owner. Impersonation Attacks: In a nutshell, one mobile phone impersonates as another in such an attack. For example, a mobile phone uses the service of a base station without billing facility for the base station, i.e., the service is used in a fraudulent way. Hardware-centric attacks belong to mobile device security only from a broader point of view. In the context of this paper, the most important class of technical vulnerabilities for mobile devices are software-centric attacks. User layer attacks contain every exploit that is not of technical nature. Eavesdropping:A passive attacker tries to intercept the conversation between mobile phone and base station Availability Attacks: One possible example is an active attacker blocking the signal of the mobile phone or base station Privacy Attacks: A passive attacker might use the smartphone’s ID to locate its owner. Impersonation Attacks: In a nutshell, one mobile phone impersonates as another in such an attack. For example, a mobile phone uses the service of a base station without billing facility for the base station, i.e., the service is used in a fraudulent way.
6
HARDWARE-CENTRIC SECURITY ASPECTS A.Intercepting MNO Smartcard Communication B.Attacking the Device:JTAG Attacks, Forensic Analysis A.Intercepting MNO Smartcard Communication B.Attacking the Device:JTAG Attacks, Forensic Analysis
7
DEVICE-INDEPENDENT SECURITY ASPECTS A.GSM: Cryptography for Protecting the Air Link B.Initial Connection and Encryption A.GSM: Cryptography for Protecting the Air Link B.Initial Connection and Encryption
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.