Smart-phone Attacks and Defenses Chuanxiong Guo, Helen J. Wang, Wenwu Zhu Outline Smart-Phone background Telecom networks assumptions Motivation Attacks Defenses Conclusions Smart-phones Rich functionalities & features
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Chuanxiong Guo, Helen J. Wang, Wenwu Zhu
O2 XDA mini S
Become end-points of both the Internet and telecom networks.
Compromised smart-phones use up radio resource at a base station
Even a handful of zombies can increase call blocking rate (0.01% required) dramatically or put the system out of service
PLMN: Public land mobile network PSTN: Public switched telephone network