Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos | |
Bai, Xiaolong ; Xing, Luyi ; Zhang, Nan ; Wang, XiaoFeng ; Liao, Xiaojing ; Li, Tongxin ; Hu, Shi-Min | |
刊名 | IEEE SECURITY & PRIVACY
![]() |
2017 | |
英文摘要 | Usability-oriented zero configuration (ZeroConf) designs, with automatic service discovery "plug-and-play" techniques, give rise to security risks. A study focusing on Apple-a major proponent of ZeroConf-brings to light a disturbing lack of security: major ZeroConf components are mostly unprotected, and popular apps and system services are vulnerable to man-in-the-middle attacks.; SCI(E); ARTICLE; 2; 42-49; 15 |
语种 | 英语 |
内容类型 | 期刊论文 |
源URL | [http://ir.pku.edu.cn/handle/20.500.11897/474715] ![]() |
专题 | 信息科学技术学院 |
推荐引用方式 GB/T 7714 | Bai, Xiaolong,Xing, Luyi,Zhang, Nan,et al. Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos[J]. IEEE SECURITY & PRIVACY,2017. |
APA | Bai, Xiaolong.,Xing, Luyi.,Zhang, Nan.,Wang, XiaoFeng.,Liao, Xiaojing.,...&Hu, Shi-Min.(2017).Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos.IEEE SECURITY & PRIVACY. |
MLA | Bai, Xiaolong,et al."Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos".IEEE SECURITY & PRIVACY (2017). |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论