- 1、本文档共15页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Advantages of FOTA for Mobile Security
1Advantages of
Firmware Over the Air (FOTA)
for Mobile Security
Gene Wang
Chairman, OTA Flash Forum
CEO, Bitfone Corporation
2First, a Quiz:
Q: What are paraskevidekatriaphobics?
A: People afflicted with a morbid, irrational fear
of Friday the 13th
Q: What percent of Americans suffer from this
condition?
A: 8%
Q: What do these notorious killers have in
common?
Jack the Ripper, Charles Manson, Jeffrey Dahmer,
Theodore Bundy and Albert De Salvo
A: 13 characters in their names
3What is OTAFF?
A “safe” acronym for a 13-letter name!
Special Interest Group focused
on OTA device management
Founded in June 2003, now 32 members
Submits recommendations to OMA
? Firmware Update Mgmt Object (FUMO)
Publishes “best practice” white papers:
? FOTA Interoperability
? End-to-end FOTA Security
FOTA Security Mobile Security
are 2 of the 4 Top Priorities in 2005
4Reviewing Intruder Capabilities
- Eavesdropping - intruder picks up signals and data connections associated with
other users; requires a modified MS
- Impersonation of a user - intruder sends signal and/or user data to the network,
which interprets data as originating from a target user; requires a modified MS
- Impersonation of the network - intruder sends signal and/or user data to a
target user, who interprets the data as originating from a genuine network;
requires a modified BS.
- Man-in-the-middle - intruder places itself in between a target user and a genuine
network and has the ability to eavesdrop, modify, delete, re-order, replay, and
spoof signals and user data messages exchanged between the two parties;
requires modified BS in conjunction with a modified MS.
- Compromised authentication vectors in the network - intruder possesses a
compromised authentication vector, which may include challenge/response
pairs, cipher keys and integrity keys. This data may have been obtained by
compromising network nodes or by intercepting signal messages on network
links.
Ref: 3G TR 33.900 V1.2.0 (2000-01) 8 3G
您可能关注的文档
- 288-香港长期保险 业务的临时统计数字.pdf
- 29-热休克_PolyI_C上调草鱼GRP78基因表达.pdf
- 29cfr1910.134.c.doc
- 2B Unit7-12复习.ppt
- 2SAR553PT100;中文规格书,Datasheet资料.pdf
- 2SCR553PT100;中文规格书,Datasheet资料.pdf
- 2_甲基_4_甲氧基苯基苯胺的合成.pdf
- 3 INHERITANCE TAX.pdf
- 28中一模 (英语).pdf
- 3 can you swim.ppt
- Adv_Funct_Mater.23.5373.2013.pdf
- AFFIRMATIVE_ACTION.pdf
- Activity-oriented Instant Messaging for Coalition Operations.pdf
- AEV-product.pdf
- ADE7754_Features_March2003.pdf
- age-related effects on.pdf
- Agilent 7700 ICP-MS现场培训教材.pdf
- Agent-based supply chain management(framework.pdf
- Aglient 1500.pdf
- AG-HVX200P.pdf
最近下载
- 信号与系统(第三版)上下册郑君里课后习题答案详解.pdf
- 2025年3月-7月深入贯彻中央八项规定精神学习教育进度计划表+八项规定精神学习教育学习计划表格.doc VIP
- 七猫中文网投稿申请表.pdf
- 2024年全球及中国锂电铜箔行业头部企业市场占有率及排名调研报告djs.docx
- 更换引流袋技术操作.pptx VIP
- ISO22000-2018食品安全管理体系:食品链中各类组织的要求(内部翻译稿).docx
- 《2014土木工程建筑工程技术毕业设计任务书.doc VIP
- 2024益阳市安化县事业单位招聘考试真题及答案.docx
- 2019快速动态响应同步调相机组验收规范第7部分:润滑油系统.pdf
- 九年级物理电学综合复习课件-苏科版.ppt VIP
文档评论(0)