移動安全 (英語:Mobile security )或更精確的說法為移動設備安全 (英語:Mobile device security ),是一種保護智能手机 、平板電腦 和筆記型電腦 不用受到與无线网络 相關的威脅[ 1] ,它在移动计算 中變得越來越重要。而較值得關注的是,目前儲存在智慧手機上的個人和商業信息的安全性 。
參考資料
書籍
論文
Bilton, Nick. Hackers With Enigmatic Motives Vex Companies . The New York Times. 26 July 2010: 5 [2021-10-15 ] . (原始内容 存档于2022-06-17).
Cai, Fangda; Chen, Hao; Wu, Yuanyi; Zhang, Yuan. AppCracker: Widespread Vulnerabilities in Userand Session Authentication in Mobile Apps (PDF) (学位论文). University of California, Davis. 2015 [2021-10-15 ] . (原始内容 (PDF) 存档于2021-10-26).
Crussell, Johnathan; Gibler, Clint; Chen, Hao. Attack of the Clones: Detecting Cloned Applications on Android Markets (PDF) (学位论文). University of California, Davis. 2012 [2021-10-15 ] . (原始内容 (PDF) 存档于2021-10-26).
Dagon, David; Martin, Tom; Starder, Thad. Mobile Phones as Computing Devices: The Viruses are Coming!. IEEE Pervasive Computing. October–December 2004, 3 (4): 11. S2CID 14224399 . doi:10.1109/MPRV.2004.21 .
Dixon, Bryan; Mishra, Shivakant. On and Rootkit and Malware Detection in Smartphones (PDF) . 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W). June–July 2010 [2021-10-15 ] . ISBN 978-1-4244-7728-9 . (原始内容 (PDF) 存档于2016-03-03).
Gendrullis, Timo. A real-world attack breaking A5/1 within hours . Proceedings of CHES ’08. Springer: 266–282. November 2008 [2021-10-15 ] . doi:10.1007/978-3-540-85053-3_17 . (原始内容 存档于2013-07-09).
Gupta, Sugandha. Vulnebdroid: Automated Vulnerability Score Calculator for Android Applications. International Symposium on Security in Computing and Communication. Springer. 2016. doi:10.1007/978-981-10-2738-3_40 .
Guo, Chuanxiong; Wang, Helen; Zhu, Wenwu. Smart-Phone Attacks and Defenses (PDF) . ACM SIGCOMM HotNets. Association for Computing Machinery, Inc. November 2004 [March 31, 2012] . (原始内容 (PDF) 存档于2014-02-22).
Halbronn, Cedric; Sigwald, John. Vulnerabilities & iPhone Security Model (PDF) . HITB SecConf 2010. 2010 [2012-04-21 ] . (原始内容 (PDF) 存档于2013-02-02).
Hogben, Giles; Dekker, Marnix. Smartphones: Information security Risks, Opportunities and Recommendations for users . ENISA. December 2010 [2021-10-15 ] . (原始内容 存档于2015-03-31).
Jøsang, Audun; Miralabé, Laurent; Dallot, Léonard. Vulnerability by Design in Mobile Network Security (PDF) . Journal of Information Warfare (JIF). 2015, 14 (4) [2021-10-15 ] . ISSN 1445-3347 . (原始内容 (PDF) 存档于2016-10-09).
Malik, Jyoti. CREDROID: Android malware detection by network traffic analysis . Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing. Association for Computing Machinery, Inc.: 28–36. 2016 [2021-10-15 ] . doi:10.1145/2940343.2940348 . (原始内容 存档于2018-11-26).
Mickens, James W.; Noble, Brian D. Modeling epidemic spreading in mobile environments . WiSe '05 Proceedings of the 4th ACM workshop on Wireless security. Association for Computing Machinery, Inc.: 77–86. 2005 [2021-10-15 ] . doi:10.1145/1080793.1080806 . (原始内容 存档于2019-04-05).
Mulliner, Collin Richard. Security of Smart Phones (PDF) (M.Sc.论文). University of California, Santa Barbara. 2006 [2021-10-15 ] . (原始内容 (PDF) 存档于2022-01-20).
Pandya, Vaibhav Ranchhoddas. Iphone Security Analysis (PDF) (学位论文). San Jose State University. 2008 [2021-10-15 ] . (原始内容 (PDF) 存档于2021-04-23).
Raboin, Romain. La sécurité des smartphones (PDF) . Symposium sur la sécurité des technologies de l'information et des communications 2009. SSTIC09 . December 2009 [2021-10-15 ] . (原始内容 (PDF) 存档于2013-09-03) (法语) .
Racic, Radmilo; Ma, Denys; Chen, Hao. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery (PDF) (学位论文). University of California, Davis. 2006 [2021-10-15 ] . (原始内容 (PDF) 存档于2021-05-05).
Roth, Volker; Polak, Wolfgang; Rieffel, Eleanor. Simple and Effective Defense Against Evil Twin Access Points . ACM SIGCOMM HotNets. 2008. ISBN 978-1-59593-814-5 . doi:10.1145/1352533.1352569 .
Ruff, Nicolas. Sécurité du système Android (PDF) . Symposium sur la sécurité des technologies de l'information et des communications 2011. SSTIC11 . 2011 [2021-10-15 ] . (原始内容 (PDF) 存档于2016-03-04) (法语) .
Ruggiero, Paul; Foote, Jon. Cyber Threats to Mobile Phones (PDF) (学位论文). US-CERT. [2021-10-15 ] . (原始内容 (PDF) 存档于2020-04-24).
Schmidt, Aubrey-Derrick; Schmidt, Hans-Gunther; Clausen, Jan; Yüksel, Kamer Ali; Kiraz, Osman; Camtepe, Ahmet; Albayrak, Sahin. Enhancing Security of Linux-based Android Devices (PDF) . Proceedings of 15th International Linux Kongress. October 2008 [2021-10-15 ] . (原始内容 (PDF) 存档于2016-03-04).
Schmidt, Aubrey-Derrick; Schmidt, Hans-Gunther; Batyuk, Leonid; Clausen, Jan Hendrik; Camtepe, Seyit Ahmet; Albayrak, Sahin. Smartphone Malware Evolution Revisited: Android Next Target? (PDF) . 4th International Conference on Malicious and Unwanted Software (MALWARE). April 2009a [2010-11-30 ] . ISBN 978-1-4244-5786-1 . (原始内容 (PDF) 存档于2012-09-03).
Shabtai, Asaf; Fledel, Yuval; Kanonov, Uri; Elovici, Yuval; Dolev, Shlomi. Google Android: A State-of-the-Art Review of Security Mechanisms. 2009. arXiv:0912.5101v1 [cs.CR ].
Thirumathyam, Rubathas; Derawi, Mohammad O. Biometric Template Data Protection in Mobile Device Using Environment XML-database . 2010 2nd International Workshop on Security and Communication Networks (IWSCN). 2010. ISBN 978-1-4244-6938-3 . (原始内容 存档于2013-02-12).
Töyssy, Sampo; Helenius, Marko. About malicious software in smartphones. Journal in Computer Virology. 2006, 2 (2): 109–119. S2CID 9760466 . doi:10.1007/s11416-006-0022-0 .
外部連結