首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 108 毫秒
1.
《无线电工程》2017,(9):1-6
移动智能终端迅猛发展的同时,也面临巨大的安全挑战,导致智能终端在各领域的应用受到严重影响。针对这些安全问题,构建了移动智能终端安全防护体系,分别从硬件安全、系统安全和应用安全3个方面进行保护。展望了移动智能终端安全未来的发展趋势,为移动智能终端安全下一步研究提供参考。  相似文献   

2.
对智能终端的应用现状和发展趋势进行总结,分析移动智能终端面临的安全威胁,从智能终端安全标准研制、应用软件管理、智能终端安全评测和行业协作等方面提出了相关措施建议。  相似文献   

3.
潘娟  史德年  马鑫  李波 《移动通信》2012,36(5):48-51
移动智能终端不但关系到用户安全,还关系到国家安全.文章介绍了移动智能终端的安全及出现的安全事件,对智能终端所面临的安全威胁进行分析,找到安全威胁的根源,提出了智能终端安全架构和安全目标.  相似文献   

4.
文章基于当前智能终端主流操作系统的特性、安全架构和安全机制,分析了智能终端所面临的安全威胁,并从安全管理、固件安全、网络安全、操作系统、应用安全等几个层面给出了防护建议。对智能终端的安全管理有很强的指导意义。  相似文献   

5.
移动智能终端操作系统安全评估方法   总被引:1,自引:0,他引:1  
沈雷 《电子科技》2012,25(3):38-41
随着移动互联网的发展,移动智能终端成为了访问互联网的主要方式之一。由于移动智能终端的自身能力受限,传统的基本安全防护方法难以直接应用于移动智能终端。文中针对移动智能终端面临的安全问题,结合移动智能终端的自身特性,提出了移动智能终端安全操作系统的评估体系和方法,给出了移动智能终端安全功能的测试过程和方法。此方法具有开销小,安全性高的特点,能够从源头上保证移动互联网的安全。  相似文献   

6.
智能终端系统安全性研究   总被引:1,自引:0,他引:1  
对智能终端所面临的安全威胁及安全需求进行了研究,分析比较了当前主流智能终端操作系统的安全特性、架构和机制,并针对现有安全问题及机制提出了安全增强方法,最后对智能终端系统未来发展趋势进行了预测分析。  相似文献   

7.
本文通过对智能终端技术架构的安全梳理和分析,找出智能终端存在的安全问题,从技术角度提出一个合理的安全体系,分别从安全管理、固件安全、网络安全、操作系统、应用安全等几个层面给出了防护建议。对中国移动智能终端的安全管理有很强的指导意义。  相似文献   

8.
移动智能终端作为移动互联网交互的重要组成部分,面临多方面的安全挑战.近年来,移动智能终端从移动网络末梢转变为互联网业务的关键入口和主要创新平台,其影响力比肩收音机、电视和互联网(PC),成为人类历史上的第四大终端产品.本文首先概述了移动智能终端安全问题,对移动智能终端的软件安全问题以及加强移动智能终端安全的措施进行了研究.  相似文献   

9.
针对智能终端面临的众多安全威胁,从软件保护和硬件保护角度分别介绍了智能终端安全防护技术,其中软件保护分为被动防护和主动防护,硬件保护包括安全启动、可信执行环境(TEE)体系、可信区域技术;并提出了智能终端安全防护技术的发展方向.  相似文献   

10.
智能终端安全威胁与防护技术研究   总被引:1,自引:0,他引:1  
对智能终端面临的安全威胁的具体形式、特点和发展趋势进行了总结分析,重点对恶意应用带来的安全威胁进行深入探析,并对现有的主流智能终端操作系统采取的安全机制进行了研究分析。在此基础上,研究提出提高智能终端安全防护能力的相关措施。  相似文献   

11.
With the emergence of smartphones, our lives have considerably changed. A smartphone has not only conventional calling, text-messaging, and photo-taking functions, but also performs many other functions by executing apps. In particular, more financial transactions using smartphone have recently become possible. With the global rapid rise in smartphone users and an ever-growing time and frequency of smartphone use, smartphones have become a target of malicious attacks. As a result, the damage caused by personal information leakage, phishing, and pharming has occurred more frequently. In this respect, however, very few studies have previously used crawling and text mining techniques, which have been actively studied quite recently; furthermore, network analysis has rarely been conducted. In this context, the present study collected the data from 2014 to the first half of 2016 on the trends of safe financing via smartphone with the crawling technique and analyzed the collected data with the text mining Technique. Our results suggest that there was a difference in the use of important keywords related to smartphone financial security, on the year-on-year basis. This suggests that an increasing number of financial services provided using smartphones should be accompanied by the elaboration of safe smartphone financial security services. In addition, for the sake smartphone financial security, not only manufacturers, but also banks, i.e. service providers, and users must pay specific attention to security issues.  相似文献   

12.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   

13.
Operating in a body area network around a smartphone user, wearables serve a variety of commercial, medical and personal uses. Depending on a certain smartphone application, a wearable can capture sensitive data about the user and provide critical, possibly life-or-death, functionality. When using wearables, security problems might occur on hardware/software of wearables, connected phone apps or web services devices, or Bluetooth channels used for communication. This paper develops an open source platform called SecuWear for identifying vulnerabilities in these areas and facilitating wearable security research to mitigate them. SecuWear supports the creation, evaluation, and analysis of security vulnerability tests on actual hardwares. Extending earlier results, this paper includes an empirical evaluation that demonstrates proof of concept attacks on commercial wearable devices and shows how SecuWear captures the information necessary for identifying such attacks. Also included is a process for releasing attack and mitigation information to the security community.  相似文献   

14.
Telecommunication Systems - The new and disruptive technologies for ensuring smartphone security are very limited and largely scattered. The available options and gaps in this research area must be...  相似文献   

15.
Risk perceptions and technology innovativeness are the two primary factors related to the adoption of mobile technologies. The current study examines the role of technology innovativeness and risk perceptions on smartphone use and dependence in an Asian context. A total of 9086 participants were recruited through online surveys from ten Asian countries. Ordinary least squares regression analyses revealed the effects of technology innovativeness, information security, privacy concern, and their interactions on smartphone use and dependence. Moreover, based on users’ smartphone usage patterns and perceptions, this paper identified four homogeneous groups using cluster analysis. Results shows that Asian smartphone users can be segmented into four groups: innovators, conservatives, moderators, and laggards. The four clusters show significant differences in demographic features. Theoretical and practical implications are discussed based on these findings.  相似文献   

16.
随着Android智能手机的普及,手机应用的安全隐患也日益凸显。提出了一种基于程序分析的Android应用程序检测方法,用于检测Android应用程序中的恶意行为。通过预处理剔除不存在恶意行为的应用程序。对通过预处理阶段的应用程序,模拟执行应用程序中的字节码指令,构建出函数的摘要信息,最终在构建的函数摘要上使污点传播算法,检测应用程序中的恶意行为。实验结果表明,该方法可以有效检测出Android应用程序的恶意行为,具有较高的实用性。  相似文献   

17.
随着智能手机的日益普及,智能手机应用的安全问题愈来愈多地引起人们的关注,尤其是在诸如网上交易、网上银行账户管理等敏感应用方面。不断涌现的新病毒与恶意软件令传统的杀毒防毒工具难以抵挡。在分析Android平台的基础上,指出了Android平台智能手机存在的安全问题,提出通过引入虚拟化技术,把敏感应用与普通应用进行隔离的方法,从而满足用户对不同应用的安全要求。  相似文献   

18.
Recently the mobile computing technology has been generally used to people with the development of the IT technology. The mobile computing environment has provided a convenient environment via the intelligent devices such as tablet PC, smartphone, etc. However, many security threats in the mobile computing environment exist. Therefore, secure elements to protect against security threats are needed. In particular, Short Message Service phishing (Smishing) damage has continued to increase with the normalization of mobile computing environment. We discuss and analyze the security considerations about Smishing in mobile computing environments. In addition, we propose an enhanced security model for detecting Smishing attack (we called “S-Detector”). The proposed model is applied to a Naive Bayes classifier to improve the Smishing attack detection in smart devices. This model distinguishes normal text message and Smishing message. And this is mainly used to filter by using statistical learning method. As a result, it is possible to analyze a text message and effectively detect SMS phishing. Finally, we demonstrate the efficiency of our model through the evaluation and analysis of our proposed model.  相似文献   

19.
An increasing number of applications and functions are being introduced into smartphones, but smartphones have limited computation ability and battery resources. To enhance smartphone capacity, cloud computing and virtualization techniques can be used to shift the workload from smartphone to computational infrastructure. In this paper, we propose a new framework in which a mirror is kept for each smartphone on a computing infrastructure in the telecom network. With mirrors, the workload can be greatly reduced, and smartphone resources can be virtually expanded. The feasibility of deploying this framework in telecom networks is demonstrated in the protocol design, a synchronization study, and a scalability test. Two applications are introduced to show how computational workload on the smartphone and traffic in the telecom network are significantly reduced using our techniques.  相似文献   

20.
为了保护贵重物品的安全,设计出一款基于超低功耗单片机MSP430和蓝牙技术的防盗系统。防盗器的控制端是基于安卓智能手机开发的应用软件,操作便捷,智能手机用户即是防盗器的潜在用户。手机通过读取防盗器蓝牙的RSSI值,可以判断手机与防盗器的距离,从而根据距离实现防盗功能。实验表明,防盗器设计方案可以实现主动报警和防盗功能,且软件所测的距离在5 m的范围内精度达到1 m以内,具有良好的实用性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号