Snooping on Snoopers: Logging as a Security Response to Physical Attacks on Mobile Devices.
Tiago João GuerreiroAna Cristina PiresLuís CarriçoPublished in: CoRR (2022)
Keyphrases
- mobile devices
- security threats
- security mechanisms
- security problems
- computer security
- security measures
- security protocols
- security vulnerabilities
- cyber attacks
- security issues
- information security
- security risks
- security breaches
- java card
- security flaws
- countermeasures
- mobile phone
- denial of service attacks
- mobile commerce
- chosen plaintext
- fault injection
- cryptographic protocols
- malicious attacks
- intrusion detection
- malicious users
- stream cipher
- context aware
- security requirements
- buffer overflow
- mobile applications
- identity theft
- mobile learning
- access control
- intrusion detection and prevention
- intrusion prevention
- information leakage
- mobile technologies
- smart phones
- secure routing
- network security
- insider attacks
- mobile computing
- smart card
- anomaly detection
- cyber security
- cryptographic algorithms
- remote server
- biometric template
- dos attacks
- key management
- cyber physical systems
- security policies
- smart grid
- intrusion detection system
- ddos attacks
- mobile users
- physical location