Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos.
IEEE Security & Privacy(2017)
摘要
Usability-oriented zero configuration (ZeroConf) designs, with automatic service discovery "plug-and-play" techniques, give rise to security implications. A study focusing on Apple--the major proponent of ZeroConf--brings to light a disturbing lack of security: major ZeroConf components are mostly unprotected, and popular apps and system services are vulnerable to man-in-the-middle attacks.
更多查看译文
关键词
IP networks,Computer security,Bluetooth,Computer applications,Authenticatoin,Wireless fidelity,Privacy,Mobile communications,Smart phones,Knowledge discovery,Informatics
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络