Assessment of Palm OS Susceptibility to Malicious Code Threats

نویسندگان

  • Tom Goovaerts
  • Bart De Win
  • Bart De Decker
  • Wouter Joosen
چکیده

The Palm OS operating system for Personal Digital Assistants (PDAs) and mobile phones has a weak security architecture, which introduces all sorts of security problems. This paper specifically targets the problem of malicious code. The main contribution of this work is the in-depth analysis of different vulnerabilities in Palm OS and the ways in which they can be exploited by malicious code. Furthermore, the key reasons for this problem are discussed and some suggestions for improvement are formulated.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats

Portable devices, such as Personal Digital Assistants (PDAs), are particularly vulnerable to malicious code threats due to their widespread implementation and current lack of a security framework. Although well known in the security industry to be insecure, PDAs are ubiquitous in enterprise environments and are being used for such applications as one-time-password generation, storage of medical...

متن کامل

USENIX Association Proceedings of the 10 th USENIX Security Symposium

Portable devices, such as Personal Digital Assistants (PDAs), are particularly vulnerable to malicious code threats due to their widespread implementation and current lack of a security framework. Although well known in the security industry to be insecure, PDAs are ubiquitous in enterprise environments and are being used for such applications as one-time-password generation, storage of medical...

متن کامل

Malicious Threats to Personal Digital Assistants

In the 1980s, no one left home without his or her FiloFax. Today, no one leaves home without his or her Personal Digital Assistant (PDA). However, while FiloFaxes contained important names and numbers, PDAs are more than just an address book. Combined with Internet access, the functionality of the PDA is moving towards a desktop computer combined with a cellular phone, small enough to put in on...

متن کامل

Resilience Assessment: Accidental and Malicious Threats

A large body of research has been dedicated to the analysis, assessment and protection of cyberphysical systems and critical infrastructures against potential threats that might affect the dependability, the security or the resilience of the services delivered to the users. Traditionally, accidental and malicious threats have been taken into account separately. In this talk we will address the ...

متن کامل

A Critical Evaluation of Vulnerabilities in Android OS: (Forensic Approach)

The Android platform is an open source operating system, which is widely used on Smartphones. Android operating system usage and adaptation is rapidly increasing with a variety of applications. It also, allows developers to freely access and modifies source code. The open nature of the Android platform attracts attackers to do different types of criminal activities. The android users likely to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005