CORC  > 北京大学  > 信息科学技术学院
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos
Bai, Xiaolong ; Xing, Luyi ; Zhang, Nan ; Wang, XiaoFeng ; Liao, Xiaojing ; Li, Tongxin ; Hu, Shi-Min
刊名IEEE SECURITY & PRIVACY
2017
英文摘要Usability-oriented zero configuration (ZeroConf) designs, with automatic service discovery "plug-and-play" techniques, give rise to security risks. A study focusing on Apple-a major proponent of ZeroConf-brings to light a disturbing lack of security: major ZeroConf components are mostly unprotected, and popular apps and system services are vulnerable to man-in-the-middle attacks.; SCI(E); ARTICLE; 2; 42-49; 15
语种英语
内容类型期刊论文
源URL[http://ir.pku.edu.cn/handle/20.500.11897/474715]  
专题信息科学技术学院
推荐引用方式
GB/T 7714
Bai, Xiaolong,Xing, Luyi,Zhang, Nan,et al. Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos[J]. IEEE SECURITY & PRIVACY,2017.
APA Bai, Xiaolong.,Xing, Luyi.,Zhang, Nan.,Wang, XiaoFeng.,Liao, Xiaojing.,...&Hu, Shi-Min.(2017).Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos.IEEE SECURITY & PRIVACY.
MLA Bai, Xiaolong,et al."Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos".IEEE SECURITY & PRIVACY (2017).
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace