Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2015 First Conference on Mobile and Secure Services (MOBISECSERV)

20-21 Feb. 2015

Filter Results

Displaying Results 1 - 23 of 23
  • Back cover

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • 2015 First Conference on Mobile and Secure Services [Back Cover]

    Publication Year: 2015, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • 2015 First Conference on Mobile and Secure Services (MOBISECSERV) [Front Cover]

    Publication Year: 2015, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Blank page

    Publication Year: 2015, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Copyright

    Publication Year: 2015, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Table of contents [Part 2]

    Publication Year: 2015, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Table of contents [Part 3]

    Publication Year: 2015, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • 2015 First Conference on Mobile and Secure Services (MOBISECSERV) [Front Matter]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Manage your own security domain on your smartphone

    Publication Year: 2015, Page(s):1 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    Mobile network operators' role as keystone players in the smartphone ecosystem is challenged by other actors and technologies that aim to reduce the importance of the Universal Integrated Circuit Card (also known as SIM card). Modern Universal Integrated Circuit Cards are Java Cards that also include a Global Platform conformant Secure Element, usually under the mobile operator's control. We argue... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An authentication architecture for cloud-based firewalling service

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3398 KB) | HTML iconHTML

    The use of cloud computing is growing by 2016, this growth will increase to become the bullk of new IT spend. Companies are interested in outsourcing security service to Cloud providers in order to reduce management and deployment costs. This outsourcing addresses many problems related to identification, authentication, secure data transfer, and privacy in Security As A Service (SECAAS)Model. Our ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low-power wireless climate monitoring system with RFID security access feature for mosquito and pathogen research

    Publication Year: 2015, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2683 KB) | HTML iconHTML

    This paper introduces a low-power wireless climate monitoring system with an RFID security access feature for mosquito and pathogen research. Mosquito-borne diseases, which are critical threats to human health, include malaria, yellow fever, dengue fever, and West Nile Virus. The wireless monitoring system provides environmental data such as temperature, humidity, wind speed, and wind direction. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance variation in host-based card emulation compared to a hardware security element

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (125 KB) | HTML iconHTML

    Traditionally, card emulation mode in Near Field Communication devices makes use of a hardware Secure Element (SE) as a secure storage and execution environment for applications. However, a different way of card emulation that bypasses the SE has emerged, referred to as Host-based Card Emulation (HCE). HCE relies on the phone CPU for processing power, sharing it with other running processes. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Over-the-internet: efficient remote content management for secure elements in mobile devices

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    We propose Over-the-Internet (OTI), a novel system that manages secure element based applications. We demonstrate our solution in the context of NFC ecosystem and show that it can be effectively used for transmitting big applications to the secure element. Our system leverages the GlobalPlatform card specification as well as the GlobalPlatform user-centric ownership model. Our solution integrates ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-factor authentication for android host card emulated contactless cards

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (643 KB) | HTML iconHTML

    With the introduction of Host Card Emulation (HCE) in Android 4.4 KitKat the Near Field Communication (NFC) card emulation mode took a twist. On one side, HCE allows for easier development and a shorter deployment path for contactless card services on the mobile phone (e.g. payment, ticketing, loyalty cards etc.). On the other side, it introduces new security issues since it does not intrinsically... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging COBIT5 in NFC-based payment technology: challenges and opportunities for security risk mitigation and audit

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Near field communication (NFC) payment technology was expected to revolutionize businesses, yet presents major challenges relating to security and assurance in the Canadian payment ecosystem. This paper suggest some of the best practices in various frameworks for Risks and Assurance management in implementing NFC-based payment technology (NFC-BPT). The NFC-BPT risks and threats are analyzed in con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards token-requestor for epayment based on cloud of secure elements and HCE mobiles

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (574 KB) | HTML iconHTML

    The EMVco consortium recently released a tokenization technical framework addressing POS and on-line transactions. This paper introduces a new architecture for Token-Generators based on Cloud of Secure Elements (CoSE), and user/administrator relationships with Token-Providers. Mobiles equipped with HCE interfaces remotely access Token- Generator applications hosted in the CoSE. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An automated virtual security testing platform for android mobile apps

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    This paper proposes an automated virtual security testing platform for Android mobile apps. The testing platform includes three key components: customizing Android OS to include mobile app trace information, creating a virtual testing platform using the customized OS, and developing static and dynamic analyzing techniques for mobile malware detection. The proposed testing platform is a server-side... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handling cross site scripting attacks using cache check to reduce webpage rendering time with elimination of sanitization and filtering in light weight mobile web browser

    Publication Year: 2015, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    In this paper we propose a new approach to prevent and detect potential cross-site scripting attacks. Our method called Buffer Based Cache Check, will utilize both the server-side as well as the client-side to detect and prevent XSS attacks and will require modification of both in order to function correctly. With Cache Check, instead of the server supplying a complete whitelist of all the known t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sesame: a secure and convenient mobile solution for passwords

    Publication Year: 2015, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    Passwords are the main and most common method of remote authentication. However, they have their own frustrating challenges. Users tend to forget passwords that are chosen to be hard to guess. Password managers are an approach to keeping our passwords safe. However, they mainly rely on one master password to secure all of our passwords. If this master password is compromised then all other passwor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile security testing approaches and challenges

    Publication Year: 2015, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    Mobile devices such as smartphones and tablets are widely used for personal and business purposes. A mobile device may carry sensitive data and becomes an easy target for cyber criminals. Mobile security is thus important. Mobile security testing targets to detect vulnerabilities and malicious apps on a mobile device. In this paper, we present four testing approaches for mobile security: mobile fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.