The Community for Technology Leaders
RSS Icon
Issue No.04 - July-Aug. (2011 vol.9)
pp: 68-70
Charlie Miller , Accuvant Labs
Smartphones' features are great, but with the power they provide, there's also a threat. Smartphones are becoming a target of attackers in the same way PCs have been for many years. This article examines the security models of two popular smart phone operating systems: Apple's iOS and Google's Android.
smart phone, Android, iPhone, iOS, computer security, jailbreaking, malware, App Store, Android Market, sandbox, SMS, data execution prevention, DEP, address space layout randomization, ASLR
Charlie Miller, "Mobile Attacks and Defense", IEEE Security & Privacy, vol.9, no. 4, pp. 68-70, July-Aug. 2011, doi:10.1109/MSP.2011.85
1. N. Seriot, "iPhone Privacy," presentation at Black Hat DC 2010; Seriot_NicolasBlackHat-DC-2010-Seriot-iPhone-Privacy-slides.pdf .
2. C. Mulliner and C. Miller, "Fuzzing the Phone in Your Phone," presentation at Black Hat 2009; MILLERBHUSA09-Miller-FuzzingPhone-PAPER.pdf .
3. "WebOSL: Examples of SMS Delivered Injection Flaws," Insight,16 Apr. 2010; 04webos-examples-of-sms-delivered-injection-flaws .
4. R.P. Weinmann, "All Your Baseband Are Belong to Us," .
5. B. Alberts and M. Oldani, "Beating Up on Android;" Android_Attacks.odt.pdf.
6. "CVE 2009-2999," Mitre, 2011; .
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool