This work attempts to overview these diverse aspects of mobile device security. We will describe mobile networks' security (WLAN and WPAN security, GSM and 3GPP security) and address platform security issues such as bytecode verification for mobile equipment and protection against viruses and Trojan horses in mobile environment - with a concrete J2ME implementation example. Finally we will turn to hardware attacks and briefly survey the physical weaknesses that can be exploited to compromise mobile equipment.\smallskip
Category / Keywords: implementation / Date: received 7 Jul 2004 Contact author: david naccache at gemplus com Available formats: PDF | BibTeX Citation Version: 20040707:154712 (All versions of this report) Discussion forum: Show discussion | Start new discussion