Information Leakage Detection and Risk Assessment of Intelligent Mobile Devices

نویسندگان

چکیده

(1) Background: Smart mobile devices provide conveniences to people’s life, work, and entertainment all the time. The basis of these is data exchange across entire cyberspace, privacy leakage has become focus attention. (2) Methods: First, we used method directed information flow conduct an API test for applications in application market, then obtained transmission. Second, by using tablet computers, smart phones, bracelets as research objects, taking scores senior users on selected indicators original data, fusion entropy Markov chain algorithm skillfully build a risk assessment mode obtain steady-state probability values different categories each device, three devices. (3) Results: Tablet computers have largest leakage, followed phones. (4) Conclusions: This paper compares situation category puts forward simple avoidance opinions, which might lay theoretical foundation subsequent protection strategies, image steganography, device security improvements.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Leakage-Resilient Layout Randomization for Mobile Devices

Attack techniques based on code reuse continue to enable real-world exploits bypassing all current mitigations. Code randomization defenses greatly improve resilience against code reuse. Unfortunately, sophisticated modern attacks such as JITROP can circumvent randomization by discovering the actual code layout on the target and relocating the attack payload on the fly. Hence, effective code ra...

متن کامل

Intelligent content caching for mobile devices

Newer mobile devices are equipped with multiple network interfaces that can be used to preemptively download multimedia content in an efficient and cost effective manner. We propose a content selection algorithm for such push-based multimedia content caching scenarios. Our approach improves cache hit rates by exploiting correlations between users who request similar content: we use this informa...

متن کامل

the study of practical and theoretical foundation of credit risk and its coverage

پس از بررسی هر کدام از فاکتورهای نوع صنعت, نوع ضمانت نامه, نرخ بهره , نرخ تورم, ریسک اعتباری کشورها, کارمزد, ریکاوری, gdp, پوشش و وثیقه بر ریسک اعتباری صندوق ضمانت صادرات ایران مشخص گردید که همه فاکتورها به استثنای ریسک اعتباری کشورها و کارمزد بقیه فاکتورها رابطه معناداری با ریسک اعتباری دارند در ضمن نرخ بهره , نرخ تورم, ریکاوری, و نوع صنعت و ریسک کشورها اثر عکس روی ریسک اعتباری داردو پوشش, وثی...

15 صفحه اول

Detection of Information leakage in cloud

Recent research shows that colluded malware in different VMs sharing physical host may use access latency of a resource as a covert channel to leak critical information. Covert channels employ time characteristics to transmit confidential information to attackers. In this manuscript we have made two important contributions and to the best of our knowledge they are novel. One is to propose a fra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematics

سال: 2022

ISSN: ['2227-7390']

DOI: https://doi.org/10.3390/math10122011