Đang chuẩn bị liên kết để tải về tài liệu:
Lecture notes on Computer and network security: Lecture 32 - Avinash Kak
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Lecture 32, security vulnerabilities of mobile devices. The learning objectives for this chapter include: What makes mobile devices less vulnerable to malware (to the extent that is the case) and Android’s “Verify Apps” security scanner, protection provided by sandboxing the apps, security (or lack thereof) provided by over-the-air encryption for cellular communications with a Python implementation of A5/1 cipher,. | Lecture 32: Security Vulnerabilities of Mobile Devices Lecture Notes on “Computer and Network Security” by Avi Kak (kak@purdue.edu) April 19, 2016 11:58pm c 2016 Avinash Kak, Purdue University Goals: • What makes mobile devices less vulnerable to malware (to the extent that is the case) and Android’s “Verify Apps” security scanner • Protection provided by sandboxing the apps • Security (or lack thereof) provided by over-the-air encryption for cellular communications with a Python implementation of A5/1 cipher • Side-channel attacks on specialized mobile devices • Examples of side-channel attacks: fault injection attacks and timing attacks • Python scripts for demonstrating fault injection and timing attacks • USB devices as a source of deadly malware • Mobile IP CONTENTS Section Title Page 32.1 Malware and Mobile Devices 3 32.2 The Good News is . 9 32.3 Android’s “Verify Apps” Security Scanner 12 32.4 Sandboxing the Apps 14 32.5 What About the Security of Over-the-Air Communications with Mobile Devices? 30 Python Implementation of A5/1 Cipher 37 32.5.1 32.6 Side-Channel Attacks on Specialized Mobile Devices 44 32.7 Fault Injection Attacks 47 32.7.1 32.8 32.8.1 Demonstration of Fault Injection with a Python script Timing Attacks 54 59 A Python Script That Demonstrates How To Use Code Execution Time for Mounting a Timing Attack 67 32.9 USB Memory Sticks as a Source of Deadly Malware 82 32.10 Mobile IP 89 2 Computer and Network Security by Avi Kak Lecture 32 32.1: MALWARE AND MOBILE DEVICES • Mobile devices — cellphones, smartphones, smartcards, tablets, navigational devices, memory sticks, etc., — have now permeated nearly all aspects of how we live on a day-to-day basis. While at one time their primary function was only communications, now they are used for just about everything: as cameras, as music players, as news readers, for checking on email, for obtaining information from the internet, for navigation, for .