Mobile phones as computing devices: The viruses are coming!

被引:81
作者
Dagon, D [1 ]
Martin, T
Starner, T
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
[2] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/MPRV.2004.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A taxonomy of attacks against mobile phones that shows known as well as potential attacks is discussed. Two types of denial-of-service (DoS) attacks against mobile phone are possible, those that attempt to flood the device and attacks that attempt to drain power. Mobile phones represent a new frontier in computing. Third-party development and open standards will be the key to creating new markets, just as they were during the transitions from mainframes to minicomputers, minicomputers to desktop PC and isolated to networked systems. Some precautions such as education, visualization, conservative defaults and profiling will help in preventing and diagnosing threats to mobile devices.
引用
收藏
页码:11 / 15
页数:5
相关论文
共 8 条
[1]  
[Anonymous], P ACM MOBIHOC LONG B
[2]  
[Anonymous], [No title captured], DOI DOI 10.1007/978-0-585-29603-6_5
[3]  
BARKAN E, 2003, CS200305 ISR I TECHN
[4]  
Gupta V, 2002, 2002 MILCOM PROCEEDINGS, VOLS 1 AND 2, P1118
[5]  
Huang YA, 2004, LECT NOTES COMPUT SC, V3224, P125
[6]  
Killourhy KS, 2004, 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, P102
[7]  
Scheler Souligne, 2003, PHENOMENE EROTIQUE 6, P19
[8]  
STUBBLEFIELD A, 2001, P NETWORK DISTRIBUTE, P1