International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Mobile Terminal Security

Authors:
Olivier Benoit
Nora Dabbous
Laurent Gauteron
Pierre Girard
Helena Handschuh
David Naccache
St\'ephane Soci\'e
Claire Whelan
Download:
URL: http://eprint.iacr.org/2004/158
Search ePrint
Search Google
Abstract: The miniaturization of electronics and recent developments in biometric and screen technologies will permit a pervasive presence of embedded systems. This - and the inclusion of networking capabilities and IP addresses in many handheld devices - will foster the widespread deployment of personal mobile equipment.\smallskip This work attempts to overview these diverse aspects of mobile device security. We will describe mobile networks' security (WLAN and WPAN security, GSM and 3GPP security) and address platform security issues such as bytecode verification for mobile equipment and protection against viruses and Trojan horses in mobile environment - with a concrete J2ME implementation example. Finally we will turn to hardware attacks and briefly survey the physical weaknesses that can be exploited to compromise mobile equipment.\smallskip
BibTeX
@misc{eprint-2004-12130,
  title={Mobile Terminal Security},
  booktitle={IACR Eprint archive},
  keywords={implementation /},
  url={http://eprint.iacr.org/2004/158},
  note={ david.naccache@gemplus.com 12606 received 7 Jul 2004},
  author={Olivier Benoit and Nora Dabbous and Laurent Gauteron and Pierre Girard and Helena Handschuh and David Naccache and St\'ephane Soci\'e and Claire Whelan},
  year=2004
}