Tuesday, May 5, 2020
Research Question and Conclusion-Free-Samples-Myassignmenthelp.com
Question: What research question does the paper address? What was the conclusion of the research? Answer: Research Question The research paper showed that increased of mobile devices has increased the possibility of leaked information. Therefore, the paper addresses the following research questions: How side-channel attacks can exploit information from the mobile devices? What procedures are followed for using Side-Channel Attacks in mobile devices? How Side-Channel Attacks can be prevented from mobile devices? What are the underlying pitfalls of the various countermeasures used against various side channel attacks? Conclusion In this particular study, the solutions for mitigating and overcoming the pitfalls of the side channel attacks were not provided. But, on the other hand, the research has provided detailed classification for the recent side channel attacks. The paper has identified the five major enablers namely sensors, Linux kernel based OS, software installation, BYOD and portability option of mobile devices. Further, the study has concluded the Local side channel attacks on the mobile devices can be counter measured with the implementation of cryptographic technology[1]. Furthermore, protection of the user input helps in preventing the smudge attacks used for stealing information from devices. With the classification system used in determining the attacks, the study has concluded that there exist specific trends among the recent side channel attacks. The various trends that has been identified in the paper includes the attacks have shifted from local physical attacks to remote attacks, where the attacker need to be present physically. Further, the attacks have changed from being active to passive and exploiting the logical properties of the mobile devices rather than the physical properties. The research paper has provided detailed understanding of the various attacks and their characteristics while paving path for future researches for evaluating mitigation and prevention strategy. Reference [1] Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, and Stefan Mangard Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices (2017). Pp.1-21.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.