Threats, Attacks, and Mitigations of Smartphone Security
نویسندگان
چکیده
منابع مشابه
Security Mitigations for Return-Oriented Programming Attacks
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomization) created a significantly more difficult environment for vulnerability exploitation. Attackers, however, have recently developed new exploitation methods which are capable of bypassing the operating system’s secur...
متن کاملCognitive Radio Networks Security Threats and Attacks: A Review
Cognitive Radio (CR) is a technology that promises to solve the spectrum shortage problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It aims to improve the utilization of the radio spectrum. Although the operational aspects of CR are being explored widely, its security aspects have gained little attention. In this survey, we p...
متن کاملCyber-Physical Control Systems: Vulnerabilities, Threats, and Mitigations
Cyber-Physical Systems (CPS) are yielding novel problems and solutions for security researchers. CPSs connect computerized controllers and human supervisors with physical systems used in the energy, transportation, water, manufacturing, and other sectors. A recent and well-known attack is the Stuxnet computer worm [1], which targeted Siemens industrial software used to control nuclear fuel proc...
متن کاملasean and new security threats
association of southeast asia nations (asean) was created in 1967 in order to prevent the threat of communism in southeast asia. but, over time, new states joined it and goals and activities of this organization expanded to other areas such as economic, commercial, political and cultural ones. thus, over time, cooperation between members expanded in a way today this regional organization is con...
متن کاملCyber Security and the Internet of Things: Vulnerabilities,Threats, Intruders and Attacks
Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Academic Journal of Nawroz University
سال: 2020
ISSN: 2520-789X
DOI: 10.25007/ajnu.v9n4a989