首页 > 最新文献

Proceedings. IEEE Workshop on Mobile Computing Systems and Applications最新文献

英文 中文
Enabling mobile application mashups with Merlion 使用鱼尾狮启用移动应用程序混搭
Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734602
Iqbal Mohomed
We present Merlion, a system that enables end-users to build custom mobile applications by creating mashups from existing desktop applications. The original application executes on a machine running remote desktop software (such as VNC server) without any modifications. Users can utilize the Merlion Designer to select relevant visual regions of the original application and create an alternate layout that is more suitable to their circumstances (e.g. taking the screen real-estate of their mobile device into account). Once the custom application has been designed, the user can utilize the Merlion Runtime (running on the user's mobile device) to interact with their custom application. Merlion can improve user productivity by simplifying user interfaces, automate repetitive actions, make applications available across different mobile form factors, and can allow applications that work on different OS platforms to operate in concert. In this paper, we describe the design of the Merlion system, details of our initial prototype, and discussion of the benefits and challenges of our approach.
我们介绍Merlion,这是一个系统,它使终端用户能够通过从现有桌面应用程序创建mashup来构建自定义移动应用程序。原始应用程序在运行远程桌面软件(如VNC服务器)的机器上执行,无需任何修改。用户可以利用鱼尾狮设计器选择原始应用程序的相关视觉区域,并创建更适合他们情况的替代布局(例如,考虑移动设备的屏幕面积)。一旦设计了自定义应用程序,用户就可以利用鱼尾狮运行时(运行在用户的移动设备上)与他们的自定义应用程序进行交互。Merlion可以通过简化用户界面、自动化重复操作、使应用程序在不同的移动设备上可用来提高用户的工作效率,并且可以允许在不同的操作系统平台上工作的应用程序协同运行。在本文中,我们描述了鱼尾狮系统的设计,我们的初始原型的细节,并讨论了我们的方法的好处和挑战。
{"title":"Enabling mobile application mashups with Merlion","authors":"Iqbal Mohomed","doi":"10.1145/1734583.1734602","DOIUrl":"https://doi.org/10.1145/1734583.1734602","url":null,"abstract":"We present Merlion, a system that enables end-users to build custom mobile applications by creating mashups from existing desktop applications. The original application executes on a machine running remote desktop software (such as VNC server) without any modifications. Users can utilize the Merlion Designer to select relevant visual regions of the original application and create an alternate layout that is more suitable to their circumstances (e.g. taking the screen real-estate of their mobile device into account). Once the custom application has been designed, the user can utilize the Merlion Runtime (running on the user's mobile device) to interact with their custom application. Merlion can improve user productivity by simplifying user interfaces, automate repetitive actions, make applications available across different mobile form factors, and can allow applications that work on different OS platforms to operate in concert. In this paper, we describe the design of the Merlion system, details of our initial prototype, and discussion of the benefits and challenges of our approach.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"22 1","pages":"72-77"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84398597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Rootkits on smart phones: attacks, implications and opportunities 智能手机上的rootkit:攻击、影响和机会
Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734596
Jeffrey Bickford, Ryan O'Hare, A. Baliga, V. Ganapathy, L. Iftode
Smart phones are increasingly being equipped with operating systems that compare in complexity with those on desktop computers. This trend makes smart phone operating systems vulnerable to many of the same threats as desktop operating systems. In this paper, we focus on the threat posed by smart phone rootkits. Rootkits are malware that stealthily modify operating system code and data to achieve malicious goals, and have long been a problem for desktops. We use three example rootkits to show that smart phones are just as vulnerable to rootkits as desktop operating systems. However, the ubiquity of smart phones and the unique interfaces that they expose, such as voice, GPS and battery, make the social consequences of rootkits particularly devastating. We conclude the paper by identifying the challenges that need to be addressed to effectively detect rootkits on smart phones.
智能手机越来越多地配备了与台式电脑相比复杂的操作系统。这种趋势使得智能手机操作系统容易受到许多与桌面操作系统相同的威胁。在本文中,我们主要关注智能手机rootkit带来的威胁。rootkit是一种恶意软件,可以偷偷修改操作系统代码和数据以达到恶意目的,长期以来一直是台式机的一个问题。我们用三个rootkit的例子来说明智能手机和桌面操作系统一样容易受到rootkit的攻击。然而,无处不在的智能手机及其暴露的独特接口,如语音、GPS和电池,使得rootkit的社会后果尤其具有破坏性。我们通过确定有效检测智能手机上的rootkit需要解决的挑战来总结本文。
{"title":"Rootkits on smart phones: attacks, implications and opportunities","authors":"Jeffrey Bickford, Ryan O'Hare, A. Baliga, V. Ganapathy, L. Iftode","doi":"10.1145/1734583.1734596","DOIUrl":"https://doi.org/10.1145/1734583.1734596","url":null,"abstract":"Smart phones are increasingly being equipped with operating systems that compare in complexity with those on desktop computers. This trend makes smart phone operating systems vulnerable to many of the same threats as desktop operating systems.\u0000 In this paper, we focus on the threat posed by smart phone rootkits. Rootkits are malware that stealthily modify operating system code and data to achieve malicious goals, and have long been a problem for desktops. We use three example rootkits to show that smart phones are just as vulnerable to rootkits as desktop operating systems. However, the ubiquity of smart phones and the unique interfaces that they expose, such as voice, GPS and battery, make the social consequences of rootkits particularly devastating. We conclude the paper by identifying the challenges that need to be addressed to effectively detect rootkits on smart phones.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"14 1","pages":"49-54"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87947496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 121
Preserving privacy in location-based mobile social applications 在基于位置的移动社交应用中保护隐私
Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734585
Krishna P. N. Puttaswamy, Ben Y. Zhao
Location-based social applications (LBSAs) rely on the location coordinates of the users to provide services. Today, smartphones using these applications act as simple clients and send out user locations to untrusted third-party servers. These servers have the application logic to provide the service, and in the process collect large amounts of user location information over time. This design, however, is shown to be susceptible to large-scale user privacy compromises even if several location cloaking techniques are employed. In this position paper, we argue that the LBSAs should adapt an approach where the untrusted third-party servers are treated simply as encrypted data stores, and the application functionality be moved to the client devices. The location coordinates are encrypted, when shared, and can be decrypted only by the users that the data is intended for. This approach significantly improves user location privacy. We argue that this approach not only improves privacy, but it is also flexible enough to support a wide variety of location-based applications used today. In this paper, we identify the key building blocks necessary to construct the applications in this approach, give examples of using the building blocks by constructing several applications, and outline the privacy properties provided by this approach. We believe our approach provides a practical alternative design for LBSAs that is deployable today.
基于位置的社交应用程序(lbsa)依赖于用户的位置坐标来提供服务。如今,使用这些应用程序的智能手机充当简单的客户端,将用户位置发送给不受信任的第三方服务器。这些服务器具有提供服务的应用程序逻辑,并在此过程中随着时间的推移收集大量用户位置信息。然而,即使采用了几种位置隐藏技术,这种设计也容易受到大规模用户隐私泄露的影响。在本文中,我们认为lbsa应该采用一种方法,将不受信任的第三方服务器简单地视为加密的数据存储,并将应用程序功能转移到客户端设备。位置坐标在共享时是加密的,并且只能由数据的目标用户解密。这种方法显著提高了用户位置的隐私性。我们认为,这种方法不仅提高了隐私性,而且足够灵活,可以支持目前使用的各种基于位置的应用程序。在本文中,我们确定了在这种方法中构建应用程序所需的关键构建块,给出了通过构建几个应用程序来使用构建块的示例,并概述了这种方法提供的隐私属性。我们相信,我们的方法为当前可部署的lbsa提供了一种实用的替代设计。
{"title":"Preserving privacy in location-based mobile social applications","authors":"Krishna P. N. Puttaswamy, Ben Y. Zhao","doi":"10.1145/1734583.1734585","DOIUrl":"https://doi.org/10.1145/1734583.1734585","url":null,"abstract":"Location-based social applications (LBSAs) rely on the location coordinates of the users to provide services. Today, smartphones using these applications act as simple clients and send out user locations to untrusted third-party servers. These servers have the application logic to provide the service, and in the process collect large amounts of user location information over time. This design, however, is shown to be susceptible to large-scale user privacy compromises even if several location cloaking techniques are employed. In this position paper, we argue that the LBSAs should adapt an approach where the untrusted third-party servers are treated simply as encrypted data stores, and the application functionality be moved to the client devices. The location coordinates are encrypted, when shared, and can be decrypted only by the users that the data is intended for. This approach significantly improves user location privacy. We argue that this approach not only improves privacy, but it is also flexible enough to support a wide variety of location-based applications used today. In this paper, we identify the key building blocks necessary to construct the applications in this approach, give examples of using the building blocks by constructing several applications, and outline the privacy properties provided by this approach. We believe our approach provides a practical alternative design for LBSAs that is deployable today.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"51 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86186190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 129
Toward trustworthy mobile sensing 走向值得信赖的移动传感
Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734592
Peter Gilbert, Landon P. Cox, Jaeyeon Jung, D. Wetherall
Commodity mobile devices have been utilized as sensor nodes in a variety of domains, including citizen journalism, mobile social services, and domestic eldercare. In each of these domains, data integrity and device-owners' privacy are first-class concerns, but current approaches to secure sensing fail to balance these properties. External signing infrastructure cannot attest to the values generated by a device's sensing hardware, while trusted sensing hardware does not allow users to securely reduce the fidelity of readings in order to preserve their privacy. In this paper we examine the challenges posed by the potentially conflicting goals of data integrity and user privacy and propose a trustworthy mobile sensing platform which leverages inexpensive commodity Trusted Platform Module (TPM) hardware.
商品移动设备已被用作各种领域的传感器节点,包括公民新闻、移动社会服务和家庭老年人护理。在这些领域中,数据完整性和设备所有者的隐私都是头等大事,但目前的安全传感方法无法平衡这些属性。外部签名基础设施无法证明设备的传感硬件生成的值,而受信任的传感硬件不允许用户为了保护其隐私而安全地降低读数的保真度。在本文中,我们研究了数据完整性和用户隐私的潜在冲突目标所带来的挑战,并提出了一个可信赖的移动传感平台,该平台利用廉价的商品可信平台模块(TPM)硬件。
{"title":"Toward trustworthy mobile sensing","authors":"Peter Gilbert, Landon P. Cox, Jaeyeon Jung, D. Wetherall","doi":"10.1145/1734583.1734592","DOIUrl":"https://doi.org/10.1145/1734583.1734592","url":null,"abstract":"Commodity mobile devices have been utilized as sensor nodes in a variety of domains, including citizen journalism, mobile social services, and domestic eldercare. In each of these domains, data integrity and device-owners' privacy are first-class concerns, but current approaches to secure sensing fail to balance these properties. External signing infrastructure cannot attest to the values generated by a device's sensing hardware, while trusted sensing hardware does not allow users to securely reduce the fidelity of readings in order to preserve their privacy. In this paper we examine the challenges posed by the potentially conflicting goals of data integrity and user privacy and propose a trustworthy mobile sensing platform which leverages inexpensive commodity Trusted Platform Module (TPM) hardware.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"46 9 1","pages":"31-36"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82762182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 183
Mobile image recognition: architectures and tradeoffs 移动图像识别:架构和权衡
Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734604
J. Hull, X. Liu, B. Erol, J. Graham, Jorge Moraleda
We argue that the most desirable architecture for mobile image recognition runs the complete algorithm on the mobile device. Alternative solutions that run the recognizer on a remote server will not be as desirable because of the delay between image capture and receipt of a result that can cause users to abandon the technique. We present a method for mobile recognition of paper documents and an application to newspapers that lets readers retrieve electronic data linked to articles, photos, and advertisements. We show that the index for a reasonable collection of daily newspapers can be downloaded in less than a minute and will fit in the memory of today's mid-range smart phones. Experimental results show that the recognition system has an overall error rate of less than 1%. We achieved a run time of 1.2 secs. per image with a collection of 140 newspaper pages on an HTC-8282 Windows Mobile phone.
我们认为移动图像识别最理想的架构是在移动设备上运行完整的算法。在远程服务器上运行识别器的替代解决方案并不理想,因为图像捕获和接收结果之间的延迟可能导致用户放弃该技术。我们提出了一种移动识别纸质文档的方法和一种报纸应用程序,让读者检索与文章、照片和广告相关的电子数据。我们展示了一个合理的日报集合的索引可以在不到一分钟的时间内下载,并且将适合今天的中档智能手机的内存。实验结果表明,该识别系统的总体错误率小于1%。我们实现了1.2秒的运行时间。在HTC-8282 Windows Mobile手机上收集140个报纸页面的图片。
{"title":"Mobile image recognition: architectures and tradeoffs","authors":"J. Hull, X. Liu, B. Erol, J. Graham, Jorge Moraleda","doi":"10.1145/1734583.1734604","DOIUrl":"https://doi.org/10.1145/1734583.1734604","url":null,"abstract":"We argue that the most desirable architecture for mobile image recognition runs the complete algorithm on the mobile device. Alternative solutions that run the recognizer on a remote server will not be as desirable because of the delay between image capture and receipt of a result that can cause users to abandon the technique. We present a method for mobile recognition of paper documents and an application to newspapers that lets readers retrieve electronic data linked to articles, photos, and advertisements. We show that the index for a reasonable collection of daily newspapers can be downloaded in less than a minute and will fit in the memory of today's mid-range smart phones. Experimental results show that the recognition system has an overall error rate of less than 1%. We achieved a run time of 1.2 secs. per image with a collection of 140 newspaper pages on an HTC-8282 Windows Mobile phone.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"20 1","pages":"84-88"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73027897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
I am a sensor, and I approve this message 我是传感器,我同意这条信息
Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734593
S. Saroiu, A. Wolman
Despite the popularity of adding sensors to mobile devices, the readings provided by these sensors cannot be trusted. Users can fabricate sensor readings with relatively little effort. This lack of trust discourages the emergence of applications where users have an incentive to lie about their sensor readings, such as falsifying a location or altering a photo taken by the camera. This paper presents a broad range of applications that would benefit from the deployment of trusted sensors, from participatory sensing to monitoring energy consumption. We present two design alternatives for making sensor readings trustworthy. Although both designs rely on the presence of a trusted platform module (TPM), they trade-off security guarantees for hardware requirements. While our first design is less secure, it requires no additional hardware beyond a TPM, unlike our second design. Finally, we present the privacy issues arising from the deployment of trusted sensors and we discuss protocols that can overcome them.
尽管在移动设备上添加传感器很流行,但这些传感器提供的读数是不可信的。用户可以制造传感器读数相对较少的努力。这种信任的缺失阻碍了应用程序的出现,因为用户有动机对他们的传感器读数撒谎,比如伪造位置或修改相机拍摄的照片。本文介绍了广泛的应用,这些应用将受益于可信传感器的部署,从参与式传感到监测能源消耗。我们提出了两种设计方案,使传感器读数值得信赖。尽管这两种设计都依赖于可信平台模块(TPM)的存在,但它们在硬件需求的安全保证上进行了权衡。虽然我们的第一种设计不太安全,但与第二种设计不同,它不需要除了TPM之外的其他硬件。最后,我们提出了由可信传感器的部署引起的隐私问题,并讨论了可以克服这些问题的协议。
{"title":"I am a sensor, and I approve this message","authors":"S. Saroiu, A. Wolman","doi":"10.1145/1734583.1734593","DOIUrl":"https://doi.org/10.1145/1734583.1734593","url":null,"abstract":"Despite the popularity of adding sensors to mobile devices, the readings provided by these sensors cannot be trusted. Users can fabricate sensor readings with relatively little effort. This lack of trust discourages the emergence of applications where users have an incentive to lie about their sensor readings, such as falsifying a location or altering a photo taken by the camera.\u0000 This paper presents a broad range of applications that would benefit from the deployment of trusted sensors, from participatory sensing to monitoring energy consumption. We present two design alternatives for making sensor readings trustworthy. Although both designs rely on the presence of a trusted platform module (TPM), they trade-off security guarantees for hardware requirements. While our first design is less secure, it requires no additional hardware beyond a TPM, unlike our second design. Finally, we present the privacy issues arising from the deployment of trusted sensors and we discuss protocols that can overcome them.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"36 1","pages":"37-42"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88814836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 163
Proving your location without giving up your privacy 在不泄露隐私的情况下证明你的位置
Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734586
Wanying Luo, U. Hengartner
Although location-based applications have existed for several years, verifying the correctness of a user's claimed location is a challenge that has only recently gained attention in the research community. Existing architectures for the generation and verification of such location proofs have limited flexibility. For example, they do not support the proactive gathering of location proofs, where, at the time of acquiring a location proof, a user does not yet know for which application or service she will use this proof. Supporting proactive location proofs is challenging because these proofs might enable proof issuers to track a user or they might violate a user's location privacy by revealing more information about a user's location than strictly necessary to an application. We present six essential design goals that a flexible location proof architecture should meet. Furthermore, we introduce a location proof architecture that realizes our design goals and that includes user anonymity and location privacy as key design components, as opposed to previous proposals. Finally, we demonstrate how some of the design goals can be achieved by adopting proper cryptographic techniques.
尽管基于位置的应用程序已经存在了好几年,但验证用户所声明位置的正确性是最近才引起研究界关注的一个挑战。现有的用于生成和验证这种位置证明的体系结构具有有限的灵活性。例如,它们不支持主动收集位置证明,因为在获取位置证明时,用户还不知道她将为哪个应用程序或服务使用此证明。支持主动位置证明是具有挑战性的,因为这些证明可能使证明发行者能够跟踪用户,或者它们可能会泄露更多关于用户位置的信息,从而侵犯用户的位置隐私,而不是应用程序严格需要的信息。我们提出了六个基本的设计目标,一个灵活的位置证明架构应该满足。此外,我们引入了一个位置证明架构,实现了我们的设计目标,并将用户匿名和位置隐私作为关键设计组件,而不是之前的建议。最后,我们将演示如何通过采用适当的加密技术来实现一些设计目标。
{"title":"Proving your location without giving up your privacy","authors":"Wanying Luo, U. Hengartner","doi":"10.1145/1734583.1734586","DOIUrl":"https://doi.org/10.1145/1734583.1734586","url":null,"abstract":"Although location-based applications have existed for several years, verifying the correctness of a user's claimed location is a challenge that has only recently gained attention in the research community. Existing architectures for the generation and verification of such location proofs have limited flexibility. For example, they do not support the proactive gathering of location proofs, where, at the time of acquiring a location proof, a user does not yet know for which application or service she will use this proof. Supporting proactive location proofs is challenging because these proofs might enable proof issuers to track a user or they might violate a user's location privacy by revealing more information about a user's location than strictly necessary to an application. We present six essential design goals that a flexible location proof architecture should meet. Furthermore, we introduce a location proof architecture that realizes our design goals and that includes user anonymity and location privacy as key design components, as opposed to previous proposals. Finally, we demonstrate how some of the design goals can be achieved by adopting proper cryptographic techniques.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"80 1 1","pages":"7-12"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89428410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
GurunGo: coupling personal computers and mobile devices through mobile data types GurunGo:通过移动数据类型将个人电脑和移动设备连接起来
Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734600
I. González, Jason I. Hong
Networked devices like desktop computers and mobile phones make it possible for people to access any of the billions of web pages available on the Internet. However, mobile devices are fundamentally different from desktop PCs in terms of input speeds, screen size, and network speeds, making it harder in practice to find information when on the go. In this paper, we introduce GurunGo, a system that monitors a person's activities on their PC for mobile data types---kinds of data likely to be useful to a person when mobile---and then proactively copies these snippets of data onto his mobile device, thus making it easier to find that information when mobile. Our initial prototype finds and extracts mobile data types from web pages that are browsed on a desktop computer, annotates it with additional relevant information, and copies it to a mobile device in the background. We discuss the design and implementation of GurunGo, as well as some of the tradeoffs and design rationale.
像台式电脑和移动电话这样的联网设备使人们能够访问互联网上数十亿个网页中的任何一个。然而,移动设备在输入速度、屏幕大小和网络速度方面与台式电脑有着根本的不同,这使得在移动中查找信息变得更加困难。在本文中,我们介绍了GurunGo,这是一个系统,它可以监控一个人在个人电脑上的活动,以获取移动数据类型——移动时可能对一个人有用的数据类型——然后主动将这些数据片段复制到他的移动设备上,从而使移动时更容易找到这些信息。我们最初的原型从台式电脑上浏览的网页中找到并提取移动数据类型,用额外的相关信息对其进行注释,并将其复制到后台的移动设备上。我们将讨论GurunGo的设计和实现,以及一些权衡和设计原理。
{"title":"GurunGo: coupling personal computers and mobile devices through mobile data types","authors":"I. González, Jason I. Hong","doi":"10.1145/1734583.1734600","DOIUrl":"https://doi.org/10.1145/1734583.1734600","url":null,"abstract":"Networked devices like desktop computers and mobile phones make it possible for people to access any of the billions of web pages available on the Internet. However, mobile devices are fundamentally different from desktop PCs in terms of input speeds, screen size, and network speeds, making it harder in practice to find information when on the go. In this paper, we introduce GurunGo, a system that monitors a person's activities on their PC for mobile data types---kinds of data likely to be useful to a person when mobile---and then proactively copies these snippets of data onto his mobile device, thus making it easier to find that information when mobile. Our initial prototype finds and extracts mobile data types from web pages that are browsed on a desktop computer, annotates it with additional relevant information, and copies it to a mobile device in the background. We discuss the design and implementation of GurunGo, as well as some of the tradeoffs and design rationale.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"9 1","pages":"66-71"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87121483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Supporting distributed private and public user interfaces in urban environments 支持城市环境中的分布式私有和公共用户界面
Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734590
S. Hosio, Marko Jurmu, Hannu Kukka, J. Riekki, T. Ojala
Proliferation of large public displays in urban cityscape gives rise to applications distributed between public displays and mobile devices. However, real deployment of distributed applications on top of this new infrastructure is challenging as no commonly accepted architectural solutions exist to rely on. In this paper, we present a platform supporting distributed application user interfaces on interactive large public screens and personal mobile devices. We demonstrate the functionality and potential of our approach by presenting a deployment of the platform with multiple distributed applications in authentic setting in a city center. We found this platform feasible to deploy interactive, appealing services on top of, and a non-cost information pick-up service as the most appealing to users.
城市景观中大型公共显示器的激增导致了公共显示器和移动设备之间分布的应用程序。然而,在这种新的基础设施之上真正部署分布式应用程序是具有挑战性的,因为没有普遍接受的体系结构解决方案可以依赖。在本文中,我们提出了一个在交互式大屏幕和个人移动设备上支持分布式应用程序用户界面的平台。我们通过在城市中心的真实环境中展示具有多个分布式应用程序的平台部署来展示我们方法的功能和潜力。我们发现在这个平台上部署交互的、有吸引力的服务是可行的,而对用户最有吸引力的是一个无成本的信息提取服务。
{"title":"Supporting distributed private and public user interfaces in urban environments","authors":"S. Hosio, Marko Jurmu, Hannu Kukka, J. Riekki, T. Ojala","doi":"10.1145/1734583.1734590","DOIUrl":"https://doi.org/10.1145/1734583.1734590","url":null,"abstract":"Proliferation of large public displays in urban cityscape gives rise to applications distributed between public displays and mobile devices. However, real deployment of distributed applications on top of this new infrastructure is challenging as no commonly accepted architectural solutions exist to rely on. In this paper, we present a platform supporting distributed application user interfaces on interactive large public screens and personal mobile devices. We demonstrate the functionality and potential of our approach by presenting a deployment of the platform with multiple distributed applications in authentic setting in a city center. We found this platform feasible to deploy interactive, appealing services on top of, and a non-cost information pick-up service as the most appealing to users.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"74 2 1","pages":"25-30"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88258152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Stragglers of the herd get eaten: security concerns for GSM mobile banking applications 掉队者被吃掉:GSM移动银行应用的安全问题
Pub Date : 2010-02-22 DOI: 10.1145/1734583.1734597
Michael Paik
The first GSM standard was published in 1989 [10], fully two decades ago. Since then, cryptanalysis has weakened or broken significant parts of the original specification. Yet many of these compromised pieces remain in common use, particularly throughout the developing world. This state of affairs presents a significant risk given the recent proliferation of high visibility and high value targets within the branchless banking space in the developing world such as M-PESA, GCASH, mChek, and Zap, each of which makes use of SIM Toolkit (STK) security measures, but in an obfuscated manner. This paper will present an overview of recent developments in GSM security and outline the need for increased cooperation and standardization in the face of rapidly eroding security measures currently in place for 2G GSM.
第一个GSM标准发布于1989年[10],距今整整20年。从那时起,密码分析已经削弱或破坏了原始规范的重要部分。然而,其中许多受损的部件仍在普遍使用,特别是在发展中国家。鉴于最近在发展中国家的无分支银行领域(如M-PESA、GCASH、mChek和Zap)中高可见性和高价值目标的扩散,这种情况带来了重大风险,它们都利用了SIM工具包(STK)的安全措施,但以一种模糊的方式。本文将概述GSM安全的最新发展,并概述面对目前2G GSM安全措施的迅速侵蚀,加强合作和标准化的必要性。
{"title":"Stragglers of the herd get eaten: security concerns for GSM mobile banking applications","authors":"Michael Paik","doi":"10.1145/1734583.1734597","DOIUrl":"https://doi.org/10.1145/1734583.1734597","url":null,"abstract":"The first GSM standard was published in 1989 [10], fully two decades ago. Since then, cryptanalysis has weakened or broken significant parts of the original specification. Yet many of these compromised pieces remain in common use, particularly throughout the developing world.\u0000 This state of affairs presents a significant risk given the recent proliferation of high visibility and high value targets within the branchless banking space in the developing world such as M-PESA, GCASH, mChek, and Zap, each of which makes use of SIM Toolkit (STK) security measures, but in an obfuscated manner.\u0000 This paper will present an overview of recent developments in GSM security and outline the need for increased cooperation and standardization in the face of rapidly eroding security measures currently in place for 2G GSM.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"279 1","pages":"54-59"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84660957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
期刊
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1