2006
DOI: 10.1007/11790754_6
|View full text |Cite
|
Sign up to set email alerts
|

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
30
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 41 publications
(30 citation statements)
references
References 5 publications
0
30
0
Order By: Relevance
“…We not only propose a solution, but fully implemented a prototype and evaluated it. Mulliner et al [20] build a label based tracking system that tracks a process' access to network interfaces to limit future access to other network resources such as the cellular modem. The SEIP [35] architecture uses D-Bus in combination with SELinux to enforce access policies for applications accessing various system resources on a smartphone.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We not only propose a solution, but fully implemented a prototype and evaluated it. Mulliner et al [20] build a label based tracking system that tracks a process' access to network interfaces to limit future access to other network resources such as the cellular modem. The SEIP [35] architecture uses D-Bus in combination with SELinux to enforce access policies for applications accessing various system resources on a smartphone.…”
Section: Related Workmentioning
confidence: 99%
“…There are academic contributions [20], [8], [35] and work performed by smartphone operating system (OS) vendors such as Apple, Google, Symbian, RIM or Microsoft. However, the efforts concentrated on the OS, to protect users from attacks and to mitigate malware such as Trojans.…”
Section: Introductionmentioning
confidence: 99%
“…In [30], several schemes have been studied to mitigate DoS attacks via queuing in the network. To prevent cross service boundary attacks, a labeling technique is used to separate the phone interface from the PDA interface of a mobile device [24]. Sarat et al [27] proposed to integrate commonwalk lengths and node frequencies to detect worms and determine their propagation origins.…”
Section: Related Workmentioning
confidence: 99%
“…The attack discussed above includes a number of attacks such as man-in-the-middle, sniffing and privacy related attacks. Another attack that is described by some of the researches is based on the cross service attack on the mobile devices [1]. Cross service attacks can occur while you are browsing from your mobile handset sitting in a shop with wireless connectivity.…”
Section: Introductionmentioning
confidence: 99%
“…The key factor contributing to the success of SVC is due to the fact that there is no efficient management policy for system APIs security for Windows Mobile. In the mobile environment, it is quite common to have a man-in-the-middle trying to sniff at the information being passed between the mobile device and the service providers [1]. Therefore it is crucial to have data access control mechanisms in place.…”
Section: Introductionmentioning
confidence: 99%