2013
DOI: 10.1007/978-3-319-01604-7_36
|View full text |Cite
|
Sign up to set email alerts
|

NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem

Abstract: As a consequence of the growing popularity of smart mobile devices, mobile malware is clearly on the rise, with attackers targeting valuable user information and exploiting vulnerabilities of the mobile ecosystems. With the emergence of large-scale mobile botnets, smartphones can also be used to launch attacks on mobile networks. The NEMESYS project will develop novel security technologies for seamless service provisioning in the smart mobile ecosystem, and improve mobile network security through better unders… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 29 publications
(19 citation statements)
references
References 25 publications
0
19
0
Order By: Relevance
“…Protocol reverse engineering tools: Similar to our proposed use case, prior works (e.g., [4,14,15]) have looked at inferring format of unknown protocols given network traces. For instance, PIP [4] uses bioinformatics algorithms [28,29,37] to perform alignment of message bits.…”
Section: Prior Work and Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Protocol reverse engineering tools: Similar to our proposed use case, prior works (e.g., [4,14,15]) have looked at inferring format of unknown protocols given network traces. For instance, PIP [4] uses bioinformatics algorithms [28,29,37] to perform alignment of message bits.…”
Section: Prior Work and Limitationsmentioning
confidence: 99%
“…Prior work on uncovering the security implications of systems (e.g., [8,15,34]) assume a baseline level of knowledge about internal workings, protocol formats and/or an access to code or binaries. These assumptions do not hold for black-box devices.…”
Section: Introductionmentioning
confidence: 99%
“…With IoT's arrival, EU industry, homes and society are catapulted into the huge arena of security risks that accompany an untested yet already universal technology that directly manages our cyber-physical reality on a daily, and indeed second by second, way beyond the security issues that are faced by mobile telephony [2,20,21], by the early machine to machine systems [1,42] or by software systems [15,16,22,25].…”
Section: Security and The Iotmentioning
confidence: 99%
“…The approach we take is based on the development of a mathematical model of user signalling behaviour from which we derive some useful analytical results. While the literature [23]- [25] has focused on analysing signalling behaviour from an energy consumption perspective, we hope that this work can offer to mobile operators a greater understanding of bottlenecks and vulnerabilities in the radio signalling system, so that network parameters may be modified so as to mitigate for those effects that lead to network outages [26], [27].…”
Section: A Signalling Stormsmentioning
confidence: 99%