Information Leakage Detection and Risk Assessment of Intelligent Mobile Devices
نویسندگان
چکیده
(1) Background: Smart mobile devices provide conveniences to people’s life, work, and entertainment all the time. The basis of these is data exchange across entire cyberspace, privacy leakage has become focus attention. (2) Methods: First, we used method directed information flow conduct an API test for applications in application market, then obtained transmission. Second, by using tablet computers, smart phones, bracelets as research objects, taking scores senior users on selected indicators original data, fusion entropy Markov chain algorithm skillfully build a risk assessment mode obtain steady-state probability values different categories each device, three devices. (3) Results: Tablet computers have largest leakage, followed phones. (4) Conclusions: This paper compares situation category puts forward simple avoidance opinions, which might lay theoretical foundation subsequent protection strategies, image steganography, device security improvements.
منابع مشابه
Leakage-Resilient Layout Randomization for Mobile Devices
Attack techniques based on code reuse continue to enable real-world exploits bypassing all current mitigations. Code randomization defenses greatly improve resilience against code reuse. Unfortunately, sophisticated modern attacks such as JITROP can circumvent randomization by discovering the actual code layout on the target and relocating the attack payload on the fly. Hence, effective code ra...
متن کاملIntelligent content caching for mobile devices
Newer mobile devices are equipped with multiple network interfaces that can be used to preemptively download multimedia content in an efficient and cost effective manner. We propose a content selection algorithm for such push-based multimedia content caching scenarios. Our approach improves cache hit rates by exploiting correlations between users who request similar content: we use this informa...
متن کاملthe study of practical and theoretical foundation of credit risk and its coverage
پس از بررسی هر کدام از فاکتورهای نوع صنعت, نوع ضمانت نامه, نرخ بهره , نرخ تورم, ریسک اعتباری کشورها, کارمزد, ریکاوری, gdp, پوشش و وثیقه بر ریسک اعتباری صندوق ضمانت صادرات ایران مشخص گردید که همه فاکتورها به استثنای ریسک اعتباری کشورها و کارمزد بقیه فاکتورها رابطه معناداری با ریسک اعتباری دارند در ضمن نرخ بهره , نرخ تورم, ریکاوری, و نوع صنعت و ریسک کشورها اثر عکس روی ریسک اعتباری داردو پوشش, وثی...
15 صفحه اولP105: Geographic Information Systems on Accident Risk Assessment and Management
لطفاً به چکیده انگلیسی مراجعه شود.
متن کاملDetection of Information leakage in cloud
Recent research shows that colluded malware in different VMs sharing physical host may use access latency of a resource as a covert channel to leak critical information. Covert channels employ time characteristics to transmit confidential information to attackers. In this manuscript we have made two important contributions and to the best of our knowledge they are novel. One is to propose a fra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2022
ISSN: ['2227-7390']
DOI: https://doi.org/10.3390/math10122011