Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles.
Andrea GallardoHanseul KimTianying LiLujo BauerLorrie Faith CranorPublished in: SOUPS @ USENIX Security Symposium (2022)
Keyphrases
- intrusion detection
- trade off
- access control
- information security
- security level
- security issues
- security systems
- information assurance
- mobile devices
- security problems
- network security
- statistical databases
- optimal strategy
- security mechanisms
- real world
- security threats
- encryption scheme
- functional requirements
- security policies
- key management
- computer security
- security model
- security requirements
- simulation model
- test bed
- database
- malicious activities