Symbian 'Vulnerability' and Mobile Threats
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Manual Del Usuario Para Nokia N8-00
Manual del Usuario para Nokia N8-00 Edición 3.1 2Contenido Contenido Restaurar configuraciones originales 31 Personalización 32 Seguridad 5 Perfiles 32 Cambiar el tema 33 Inicio 6 Pantalla de inicio 34 Teclas y partes 6 Organizar las aplicaciones 36 Cambiar el volumen de una llamada, Acerca de Tienda Nokia 37 canción o video 8 Descargar un juego, aplicación u otro Bloquear o desbloquear las teclas y la elemento 38 pantalla 8 Insertar o quitar la tarjeta SIM 9 Teléfono 38 Insertar o quitar la tarjeta de Llamar a un número de teléfono 38 memoria 11 Activar el altavoz durante una Carga 12 llamada 39 Ubicaciones de la antena 14 Buscar un contacto desde el Colocar la correa para muñeca 15 marcador 39 Auricular 15 Colocar el teléfono en silencio 40 Encender o apagar el teléfono 16 Llamar a un contacto 40 Usar el teléfono por primera vez 16 Contestar una llamada en espera 41 Copiar contactos o fotos desde el Realizar una llamada de video 41 teléfono anterior 17 Responder una llamada de video 42 Usar el manual del usuario en el Rechazar una llamada de video 42 teléfono 18 Realizar una llamada de multiconferencia 43 Instalar Nokia Suite en la Llamar a los números que usa con computadora 18 más frecuencia 44 Usar su voz para llamar a un Uso básico 19 contacto 44 Usar la barra de herramientas 19 Hacer llamadas por Internet 45 Acciones de la pantalla táctil 19 Llamar al último número marcado 46 Usar accesos directos 22 Grabar una conversación telefónica 46 Alternar entre las aplicaciones Ver las llamadas perdidas 46 abiertas 23 Llamar al buzón de -
Symbian OS Platform Security Model
THE SYMBIAN OS BECAME FULLY OPEN sourced in February 2010, which opens even BO LI, ELENA RESHETOVA, AND T U O M A S A U R A more possibilities for application develop- ers to understand and analyze its security Symbian OS solution. We present a short introduction to the software features of Symbian plat- platform form security: three trust tiers, capability model, data caging, and the Symbian signed security model process. We also try to compare the security Bo Li is a second-year student in the master’s solution with the classical design principles program in security and mobile computing in this area, as well as briefly discuss gen- at Aalto University, Finland. He got his bach- elor’s degree in communications engineering eral design challenges and potential weak- in 2008 from Fudan University, China. nesses. [email protected] Elena Reshetova is a senior security engineer Introduction at Nokia, as well as a postgraduate student at Aalto University. She is interested in With the development of mobile devices and mo- various research areas related to platform bile computers, more and more people rely strongly security, security aspects of networking, and on them. People use mobile devices and mobile cryptography. computers to arrange their schedules, contact each [email protected] other, process emails, and share rich media con- tent. People believe it is safe to do so because it Tuomas Aura is a professor at Aalto Uni- versity, Finland. His research interests are feels secure just knowing it is “right there with security and privacy in communications you” [8]. -
Symbian Foundation Press Conference
Symbian Foundation Press conference M/C – Merran Wrigley Exciting Internet experiences for the aspirations of billions 2 © 2008 Symbian Foundation Mobile software set free Symbian Foundation Kai Öistämö Executive Vice President, Nokia Shared vision for an unparalleled open mobile software platform 4 © 2008 Symbian Foundation That unites Symbian OS, S60, UIQ and MOAP(S) 5 © 2008 Symbian Foundation Creating the most proven, open, complete mobile software platform 6 © 2008 Symbian Foundation With over 200 million devices already shipped 7 © 2008 Symbian Foundation For free. 8 © 2008 Symbian Foundation Creating one platform, royalty-free Foundation Differentiated Member experience MOAP(S) 9 © 2008 Symbian Foundation Creating one platform, royalty-free Foundation Differentiated Member experience Symbian Foundation Platform Applications suite Runtimes UI framework Middleware Operating system Tools & SDK 10 © 2008 Symbian Foundation The first step to our goal • Acquiring Symbian Ltd • Closing expected in Q4 2008 • Symbian Ltd to be part of Nokia • Nokia will contribute Symbian OS and S60 to Symbian Foundation 11 © 2008 Symbian Foundation Fulfilling the Symbian mission Symbian Foundation Nigel Clifford CEO, Symbian Symbian Ltd Mission To become the most widely used software platform on the planet 13 © 2008 Symbian Foundation The leading global open platform 12% Symbian Linux 11% Microsoft RIM 60% Apple 11% Other Source Canalys – Cumulative 4% 12 month period to Q1 2008 2% 14 © 2008 Symbian Foundation The choice for the top vendors Samsung MOTO -
Symbian Worm Yxes: Towards Mobile Botnets?
J Comput Virol (2012) 8:117–131 DOI 10.1007/s11416-012-0163-2 ORIGINAL PAPER Symbian worm Yxes: towards mobile botnets? Axelle Apvrille Received: 20 December 2010 / Accepted: 3 April 2012 / Published online: 1 May 2012 © Springer-Verlag France 2012 Abstract In 2009, a new Symbian malware named the costs and inconveniences caused by the famous Comm- SymbOS/Yxes was detected and quickly hit the headlines Warrior worm, with 115,000 infected phones [14] and over as one of the first malware for Symbian OS 9 and above 450,000 messages [16] sent prove the matter cannot be under- all as the foretaste of a mobile botnet. Yet, detailed analy- estimated. sis of the malware were still missing. This paper addresses At the beginning of 2009, a new Symbian malware was this issue and details how the malware silently connects to detected [13]. It installed on recent and widely-deployed the Internet, installs new malware or spreads to other victims. Symbian OS 9 phones. The malware looked perfectly legiti- Each of these points are illustrated with commented assembly mate and there was no hint it might be a malware apart from code taken from the malware or re-generated Symbian API the fact it created no application icon. As it was typically con- calls. Besides those implementation aspects, the paper also nected to the word “sexy” (sexy.sisx as package name, “Sexy provides a global overview of Yxes’s behaviour. It explains View”, “Sexy Girls”, “Sexy Space” as application name etc), how malicious remote servers participate in the configuration Fortinet christened it Yxes, i.e. -
Nokia N8-00 Schematics
Service schematics RM-596 IMPORTANT Version information Contents This document is intended for use by authorized Nokia service centers only. Please use the document together While every effort has been made to ensure that the Front page 1 with other documents such as the Service Manual and document is accurate, some errors may exist. Please Service Bulletins. always check for the latest published version for this Imaging processor, Camera 2 document. RAPS, Imaging processor, Display IF, Touch IF, HDMI 3 If you find any errors in the document please Measurements send email to: [email protected] RAPS, Mass memory, Combo memory, Sensors, LEDs, UI keys 4 All measurements were made using the following equipment: GAZOO, Battery, HS USB, SIM, Power key 5 Nokia repair SW : Phoenix 2009.34.014.40684 1.0 First approved version. 6 Oscilloscope : PicoScope 3206 GAZOO, Audio, AV connector, MMC 2.0 Second approved version. Spectrum Analyzer : Advantest R3162 7 Multimeter : Fluke 175 BTH FM, WLAN, GPS The measurement points in the schematics are linked to the oscillo- RF part 8 grams on the signal overview page. The links cycle between the meas- urement point in the schematics, the oscillogram and the measurement Signal overview top 9 point in the component finder. Component finder top 10 This material,including documentation and any related computer programs is protected 11 by copyright, controlled by Nokia. All rights are reserved. Copying, including reproducing, Component finder bottom modifying, storing, adapting or translating any or all of this material requires the prior written consent of Nokia. This material also contains company confidential information, which may not be disclosed to others without the prior written consent of Nokia. -
Nokia N8–00 User Guide
Nokia N8–00 User Guide Issue 2.1 2Contents Contents Organise your applications 35 Download a game, application, or other item 35 Safety 5 Telephone 36 Get started 6 Call a phone number 36 Keys and parts 6 Search for a contact 36 Change the volume of a call, song, or Call a contact 37 video 8 Make a video call 37 Lock or unlock the keys and screen 8 Make a conference call 38 Insert or remove the SIM card 9 Use speed dial 39 Insert or remove the memory card 10 Use your voice to call a contact 39 Charging 12 Make calls over the internet 40 Antenna locations 14 Call the last dialled number 41 Attach the wrist strap 15 Record a phone conversation 41 Headset 15 Turn to silence 41 Switch the device on or off 15 View your missed calls 42 Use your device for the first time 16 Call your voice mailbox 42 Copy contacts or pictures from your old Divert calls to your voice mailbox or device 16 another phone number 42 Device set-up 17 Prevent making or receiving calls 43 Use the in-device user guide 17 Allow calls only to certain numbers 44 Video sharing 44 Install Nokia Ovi Suite on your PC 18 Contacts 46 Basic use 19 About Contacts 46 Touch screen actions 19 Save phone numbers and mail Interactive home screen elements 22 addresses 46 Switch between open applications 23 Save a number from a received call or Write text 23 message 47 Display indicators 26 Contact your most important people Set the notification light to blink for quickly 47 missed calls or messages 28 Set a ringing tone for a specific Search in your device and on the contact 47 internet -
Nokia 808 Pureview 41 Megapixel Camera with Carl Zeiss Lens
Sep 22, 2012 14:50 IST Nokia 808 PureView 41 megapixel Camera with Carl Zeiss lens The all new Nokia 808 PureView is a game changing phone in the world of smartphones. This exclusive hand set has got 4 inches AMOLED dispay which is clear black. The feel of this great hand set is quite similar to that of Nokia 5800 with an allusion of Nokia Lumia 610. Although these mentioned phones are small and had flat backs. In India the Nokia 808 PureView price is Rs.30, 499. The quality of the calls in this phone comes without any kind of issues. Comparing the size of Nokia 808 PureView with the iPhone 4S it is not that small having 123.9mm x 60.2mm x 13.9mm as its proper dimensions which gets expanded to 17.95 mm when the camera bulges out. This new Nokia phone has arrived in the market with a camera of 41 MP although Nokia N8 is said to have got the finest cameras under the Nokia phone range. The total hardware weight makes the Nokia 808 PureView a bit heavy having a mass of 169 grams. This is the heaviest phone out of all the smartphones that are available in the market. There is a smart dial system on the interface of the phone dialer. There also a soft button at the bottom of the phone which gives an easy access to the contacts as well as the call logs. The messaging option in this Nokia 808 PureView phone is free from any sorts of trouble. -
Operating System Components for an Embedded Linux System
INSTITUTEFORREAL-TIMECOMPUTERSYSTEMS TECHNISCHEUNIVERSITATM¨ UNCHEN¨ PROFESSOR G. F ARBER¨ Operating System Components for an Embedded Linux System Martin Hintermann Studienarbeit ii Operating System Components for an Embedded Linux System Studienarbeit Executed at the Institute for Real-Time Computer Systems Technische Universitat¨ Munchen¨ Prof. Dr.-Ing. Georg Farber¨ Advisor: Prof.Dr.rer.nat.habil. Thomas Braunl¨ Author: Martin Hintermann Kirchberg 34 82069 Hohenschaftlarn¨ Submitted in February 2007 iii Acknowledgements At first, i would like to thank my supervisor Prof. Dr. Thomas Braunl¨ for giving me the opportunity to take part at a really interesting project. Many thanks to Thomas Sommer, my project partner, for his contribution to our good work. I also want to thank also Bernard Blackham for his assistance by email and phone at any time. In my opinion, it was a great cooperation of all persons taking part in this project. Abstract Embedded systems can be found in more and more devices. Linux as a free operating system is also becoming more and more important in embedded applications. Linux even replaces other operating systems in certain areas (e.g. mobile phones). This thesis deals with the employment of Linux in embedded systems. Various architectures of embedded systems are introduced and the characteristics of common operating systems for these devices are reviewed. The architecture of Linux is examined by looking at the particular components such as kernel, standard C libraries and POSIX tools for embedded systems. Furthermore, there is a survey of real-time extensions for the Linux kernel. The thesis also treats software development for embedded Linux ranging from the prerequi- sites for compiling software to the debugging of binaries. -
Instituto Tecnológico De Costa Rica Escuela De Ingenier´Ia En
Instituto Tecnol´ogicode Costa Rica Escuela de Ingenier´ıaen Electr´onica Improvement of small satellite's software design with build system and continuous integration tools para optar por el t´ıtulode Ingeniero en Electr´onicacon ´enfasisen sistemas empotrados con el grado acad´emicode Maestr´ıa Allan Granados [email protected] Cartago, Diciembre, 2015 2 Contents 1 Introduction 8 1.1 Previous work focus on small satellites . .9 1.2 Problem statement . 11 1.3 Proposed solution . 13 1.3.1 Proposed development . 13 2 Software development approaches for small satellites 15 2.1 Software methodologies used for satellites design . 15 2.2 Small satellite design and structure . 17 2.3 Central computation system in satellites. Homogeneous and Het- erogeneous systems . 18 2.4 Different approach on software development for small satellites . 20 2.4.1 Software development: Monolithic approach . 20 2.4.2 Software development: Development by component . 21 2.5 Open Source tools on the design and implementation of software satellite . 23 3 Integration of build system for small satellite missions 24 3.1 Build systems as an improvement on the design methodology . 24 3.1.1 Yocto build system . 29 4 Development platforms 32 4.1 Beagleboard XM . 32 4.2 Pandaboard . 35 4.3 Beaglebone . 38 5 Design and implementation of the construction system 41 5.1 Construction System . 41 5.1.1 The hardware independent layer: meta-tecSat . 42 5.1.2 The hardware dependent later: meta-tecSat-target . 43 5.1.3 Integration of the dependent and independent hardware layers in the construction system . 44 5.1.4 Adding a new recipe to a layer . -
Contemporary Report
. .......... Mobile Phone and Infrastructure Vulnerabilities Summary and Analysis of Disclosed Issues 2005-2006 Prasanna Kannan Nesret Krasniqi The Thesis comprises 30 ECTS credits and is a compulsory part in the Master of Science with a Major in Master’s Programme in Electrical Engineering with specialisation in Communication and Signalprocessing, 120 ECTS credits Nr 9/2007 Mobile Phone and Infrastructure Vulnerabilities 2005 & 2006 Mobile Phone and Infrastructure Vulnerabilities – summary and analysis of disclosed issues 2005 - 2006 Prasanna Kannan Nesret Krasniqi Master thesis Series and Number Communication and Signal Processing 9/2007 University College of Borås School of Engineering SE-501 90 BORÅS Telephone +46 033 435 4640 Examiner: Jim Arlebrink Supervisor: Lennart Damm Client: OnePutt Solutions, Uppsala, Sweden. Date: 2007-11-08 Keywords: Mobile vulnerabilities , symbian viruses 1 Mobile Phone and Infrastructure Vulnerabilities 2005 & 2006 TABLE OF CONTENTS Abstract………………………………………………………………………………………………………………………10 Introduction……………………………………………………………………………………………………………..........11 About this report…………………………………………………………………………………………………………….12 What is a mobile phone virus and how does it spread? .............. ……………………………………………………………………114 List of vulnerabilities addressed…………………………………………………………………………………………….13 Statistics diagrams for 2005 and 2006………………………………………………………………………………………14 Overview of vulnerability families…………………………………………………………………………………………..16 Analysis………………………………………………………………………………………………………………………26 1. Skulls.D vulnerability -
Yet Another Symbian Vulnerability Update
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 11-30-2010 Yet Another Symbian Vulnerability Update Nizam Uddin Bhuiyan Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/ism Part of the Information Security Commons DOI: 10.4225/75/57b523eccd8ae 8th Australian Information Security Mangement Conference, Edith Cowan University, Perth Western Australia, 30th November 2010 This Conference Proceeding is posted at Research Online. https://ro.ecu.edu.au/ism/101 Proceedings of the 8th Australian Information Security Management Conference Yet Another Symbian Vulnerability Update Nizam Uddin Bhuiyan School of Computer and Security Science Edith Cowan University Perth, Western Australia [email protected] Abstract The more the mobile devices are approaching to advance their security, the numbers of vulnerabilities are also becoming more astonishing. The number of mobile phones including smart phones is rising vertically, and so has the amount of malware activity. This report documents the latest threats in Symbian mobile industry and analyses the consequence. In addition, it will suggest the possible solution that may help individuals to protect their device & ultimately maintain the privacy. Keywords Symbian, Nokia vulnerability, Nokia threats, Mobile threat, Symbian malware, Symbian virus, Cell security, Consequences and counter measure for mobile threats. BACKGROUND The popularity of mobile has reached to sky high regardless whether you receive a blank SMS frequently or your mobile keeps sending a SMS to strangers persistently without your knowledge. According to Goode Intelligence 2009 Mobile Security Survey, “In the last couple of years, the percentage of mobile messaging traffic (SMS/MMS/e-mail) that is defined as spam or malware has risen from approximately 2% to between 20% and 30% of total traffic” (Francis, 2010). -
Mobile OS: Analysis of Customers’ Values
Mobile OS: analysis of customers’ values Georgii Shamugiia Bachelor's Thesis Business Administration 2020 Mobile OS 01.11.2020 Author(s) Georgii Shamugiia Degree programme Bachelor of Business Administration SAMPO18 Report/thesis title Number of pages Mobile OS: analysis of customer's values and appendix pages 14 + 47 The rapid development of the mobile industry since the start of new millennium led to much more extensive usage of mobile devices than desktop computers. Fast-developing technol- ogies of wireless networking led to the excessive need of a device, which can search any info on the web conveniently, be a decent communicational tool and be able to adapt to dif- ferent needs of customers. The device which fully fulfils this need is a smartphone, which is being widely used today by the majority of the global population. In this thesis, the author digests the tools, which allows smartphones to work appropriately, give consumers a pleasuring experience while using them and run all the operations and data stored on them. These tools are mobile op- erating systems – platforms, which allow all those things and even more. In this research, the author investigates the historical development of mobile operating systems, which put a mark in the history of the industry. By digesting three cases of Nokia, Blackberry and Mi- crosoft, the author explains what were the selling points, that succeeded and managed to popularise each mobile operating system globally among consumers and gadget manufac- turers and what were the reasons that caused their global downfall. A separate chapter of this research is dedicated to a survey regarding customer values and customer opinions about mobile devices and mobile operating systems.