|
OUSPG[This page is CSS2 enabled. Your browser might not fully support it] Vulnerability disclosure publications and discussion tracking$RCSfile: paper.html,v $ $Revision: 1.9 $ $Date: 2005/05/10 05:38:43 $ ABSTRACTInformation security incidents plague the Internet. Our society depends on phone networks. Today, the Internet has gone mobile. There will be an inevitable clash between these two worlds. Mobile phones have transformed into interconnected computing appliances and information about their security vulnerabilities begins to roll-in. We explored the vulnerability scene of the mobile phone networks. What would be characteristic to the mobile phone network vulnerabilities? What security problems in mobile phones have been publicly announced? How did WAP implementations survive test-suites constructed to find flaws with security implications? We realised that despite its pecularities, such as patch deployment problems and a lack of real market diversity, the mobile phone vulnerability scene resembles its Internet counterpart. We encourage you to keep-up your security methodology and level of scrunity even in mobile context. Table of contents
VulnerabilitiesDesign vulnerabilities
Implementation vulnerabilities
Security solutions
Analytical papers
Links to other vulnerability disclosure tracking listshttp://www.ee.oulu.fi/research/ouspg/sage/disclosure-tracking/index.html [This page is CSS2 enabled. Your browser might not fully support it] |