acm-header
Sign In

Communications of the ACM

ACM TechNews

Eavesdropping on Smartphone Secrets


View as: Print Mobile App Share:

Security researchers at Cryptography Research say the smart card attack involving differential power analysis could be used to target smartphones. Cryptography Research adapted the technique of analyzing the power consumption patterns of smart cards and found that the approach can reveal the cryptographic keys used to access a carrier's network or to secure data stored on the device.

Cryptography Research's Benjamin Jun says attacks on mobile devices should be a concern, considering key corporate data are now being accessed using such stripped-down environments. "Which means that someone who's trying to attack the device generally has an easier time, because it's not as complicated as a desktop system," Jun says.

Although attackers have experience targeting embedded systems, manufacturers should be able to come up with countermeasures for smartphones, Jun says. "The main question is whether protections can be done entirely in software or not."

From Technology Review
View Full Article

 

Abstracts Copyright © 2009 Information Inc., Bethesda, Maryland, USA


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account