Professional Documents
Culture Documents
Smart-Phone Attacks and Defenses: Chuanxiong Guo Helen J. Wang Wenwu Zhu
Smart-Phone Attacks and Defenses: Chuanxiong Guo Helen J. Wang Wenwu Zhu
Chuanxiong Guo
xguo@ieee.org
Helen J. Wang
helenw@microsoft.com
Microsoft Research
Microsoft Research
ABSTRACT
" &
1.
INTRODUCTION
% '
()*+, -./0
144/
.44 1445
67 -130
8
!
9 ..
"
&
!
" "
:
" $
" ;
% "
< =
& >
Wenwu Zhu
wenwu.zhu@intel.com
Intel Corporation
'
" '
"
$ 1 $ 3
"
?
"
"
" $ "
$ /
"
$ 2 $ @
2. SMART-PHONES
$
'
"
67 >
.
"
"
> "
\
]$ ^
$&$
-90
"
"
% "
!
"
7&>
]$
>6
$ $&$ -.0 & &
$ -50
" "
6$
" -/0
3.1 Compromising Smart-Phones
%
%
$& %
#
&
> %&>&>
. LLKTZR VEPJ LOF WQLFEQFL# $
&>
12 &! .1/ 144
! ]
67 %8
% ' $ %8 -.90
\
%&>
R
QTOEPQBKLBPQ# $
%
=
!
%
3 / 7&>
"
67
!
" -3 ..0
0
-@
%
" >$
=
! 67 %
% "
6 >
$&
%
" 6> ^ ^
$
"
% '
7 -./0
7
"
& $
$ >6 )
() -@0
"
% $&
!
%
!
'
$
'
%
"
"
' "
) * +
,)
" %
" "
4 4 .
%
"
"
% "
\
^ -.0 #
% "
7 "
"
!
" "
%
" "
= "
$ $ "
6$%
^
7 >
^7> %
^7>
" $
.. 144 .
>"
!
8 " "
$&$
:
?
$&$
"
%
&$ $&
'
"
$& -1.0
$& .24444
&
"
;
"
%
$&
'
"
"
"
]6
!
>
!
?
"
$ "
?
=
=
=
$
"
'
4.
DEFENSE
6
-.20
"
67 -20
I OKEUFQBQCH $
]$
7
%
>6
KEUYKEF OKEUFQBQCH
$& $%
"
'
!
" ;
"
" >
"
'
%
"
>
"
"
> $ %
"
"
" %
"
'
"
" "
#
. $
$& %
' "
41..
1
]$ $&
>6
]$
$ / . %
"
' %
" ]$
]$
$ / .
5. DISCUSSIONS
5.1 Modem-Equipped or VoIP-Enabled PCs
&
" $ 3
67
"
% "
% "
"
]
"
6.
CONCLUSION
"
7.
-.10
-.30
-./0
-.20
-.@0
-.50
-.0
ACKNOWLEDGEMENT
8.
-..0
REFERENCES
1
1
-@0 & 7
&
$
#
-50 $
7 &
>
& &
$
(+ )+ )
) + 144/
-0
!
"
]
!!
#
, +
,)+) +
) + ,+ + 144/
-90 $ $&$
#
-.40 % 7
%7 %6& $
'
.1#
6
#
-.90
-140
-1.0
-110
-130
-1/0
-120