Threat modeling of a mobile device management system for secure smart work

被引:0
|
作者
Keunwoo Rhee
Dongho Won
Sang-Woon Jang
Sooyoung Chae
Sangwoo Park
机构
[1] The Attached Institute of ETRI,College of Information and Communication Engineering
[2] Sungkyunkwan University,undefined
来源
关键词
Mobile device management system; Threat modeling; Security requirement; Smartphone; Tablet PC;
D O I
暂无
中图分类号
学科分类号
摘要
To enhance the security of mobile devices, enterprises are developing and adopting mobile device management systems. However, if a mobile device management system is exploited, mobile devices and the data they contain will be compromised. Therefore, it is important to perform extensive threat modeling to develop realistic and meaningful security requirements and functionalities. In this paper, we analyze some current threat modeling methodologies, propose a new threat modeling methodology and present all possible threats against a mobile device management system by analyzing and identifying threat agents, assets, and adverse actions. This work will be used for developing security requirements such as a protection profile and design a secure system.
引用
收藏
页码:243 / 256
页数:13
相关论文
共 50 条
  • [1] Threat modeling of a mobile device management system for secure smart work
    Rhee, Keunwoo
    Won, Dongho
    Jang, Sang-Woon
    Chae, Sooyoung
    Park, Sangwoo
    ELECTRONIC COMMERCE RESEARCH, 2013, 13 (03) : 243 - 256
  • [2] Threat analysis of smart mobile device
    Pu, Shi
    Chen, Zhouguo
    Huang, Chen
    Liu, Yiming
    Zen, Bing
    2014 31th URSI General Assembly and Scientific Symposium, URSI GASS 2014, 2014,
  • [3] Threat Analysis of Smart Mobile Device
    Pu, Shi
    Chen, Zhouguo
    Huang, Chen
    Liu, Yiming
    Zen, Bing
    2014 XXXITH URSI GENERAL ASSEMBLY AND SCIENTIFIC SYMPOSIUM (URSI GASS), 2014,
  • [4] Smart energy management in a smart environment using a mobile device
    Tariq, Taleb
    2014 GLOBAL SUMMIT ON COMPUTER & INFORMATION TECHNOLOGY (GSCIT), 2014,
  • [5] Secure Mobile Device Management Based on Domain Separation
    Kim, GeonLyang
    Jeon, YongSung
    Kim, JeongNyeo
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 918 - 920
  • [6] Design and Implementation of a Communication Protocol for Mobile Device Controlled Smart Home Management System
    Mentesoglu, Mustafa
    Kavak, Adnan
    Yakut, Mehmet
    Tangel, Ali
    Sahin, Suhap
    Ozcan, Hikmetcan
    2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 1370 - 1373
  • [7] Mobile Device Threat: Malware
    Atanassov, Nikolay
    Chowdhury, Md Minhaz
    2021 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2021, : 7 - 13
  • [8] SecTap: Secure Back of Device Input System for Mobile Devices
    Ling, Zhen
    Luo, Junzhou
    Liu, Yaowen
    Yang, Ming
    Wu, Kui
    Fu, Xinwen
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1520 - 1528
  • [9] Secure and structured IoT smart grid system management
    Lim, Jiyoung
    Doh, Inshil
    Chae, Kijoon
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2017, 13 (02) : 170 - 185
  • [10] Energy management application for smart grids aiming at mobile device
    Ferreira, M.
    Aoki, A. R.
    Eggea, R. F.
    2013 IEEE PES CONFERENCE ON INNOVATIVE SMART GRID TECHNOLOGIES (ISGT LATIN AMERICA), 2013,