Abstract | ||
---|---|---|
The development of mobile technologies and services has contributed to the large-scale deployment of smartphones and tablets. These environments are exposed to a wide range of security attacks and may contain critical information about users such as contact directories and phone calls. Assessing configuration vulnerabilities is a key challenge for maintaining their security, but this activity should be performed in a lightweight manner in order to minimize the impact on their scarce resources. In this paper we present a novel approach for assessing configuration vulnerabilities in mobile devices by using a probabilistic cost-efficient security framework. We put forward a probabilistic assessment strategy supported by a mathematical model and detail our assessment framework based on OVAL vulnerability descriptions. We also describe an implementation prototype and evaluate its feasibility through a comprehensive set of experiments. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1109/CNSM.2013.6727842 | Network and Service Management |
Keywords | Field | DocType |
mobile computing,mobile radio,probability,telecommunication security,OVAL vulnerability description,configuration vulnerability,mobile security assessment,mobile services,mobile technology,probabilistic assessment strategy,probabilistic cost-efficient security framework,security attack,smartphones,tablets | Mobile technology,Mobile computing,Computer science,Computer security,Computer network,Security service,Cloud computing security,Mobile Web,Probabilistic logic,Security information and event management,Computer security model | Conference |
ISSN | Citations | PageRank |
2165-9605 | 2 | 0.40 |
References | Authors | |
8 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Martín Barrère | 1 | 7 | 1.81 |
Gaetan Hurel | 2 | 16 | 2.96 |
Remi Badonnel | 3 | 154 | 22.43 |
Olivier Festor | 4 | 665 | 85.40 |