1,889 Hits in 7.4 sec

Automatic Test Generation on a (U)SIM Smart Card [chapter]

Céline Bigot, Alain Faivre, Christophe Gaston, Julien Simon
2006 Lecture Notes in Computer Science  
Then, we suggest a way to model (U)SIM smart card functionalities in UML. We use the test generator on our (U)SIM smart card UML models and automatically produce our first test cases.  ...  Usually, testing smart card software is carried-out by specialized engineers in a proprietary language. Testing represents generally half of smart card development effort.  ...  To begin our experience, we shall limit our domain to (U)SIM smart cards. For (U)SIM smart cards, there are different standards, which describe a lot of card features.  ... 
doi:10.1007/11733447_25 fatcat:ob3s2t473jdbnadx4qcfhyypoa

The U-Constructs: Four Information Drives

Iris Junglas, Richard T. Watson
2006 Communications of the Association for Information Systems  
This article elaborates and extends several concepts that lay the foundation for thinking about next-generation information requirements.  ...  Facing a world of ubiquitous networks and universal devices, a world in which users can access networks at any time from any place using a range of devices to invoke unique and personalized services, it  ...  The smart card, also called a SIM (Subscriber Identity Module) card, contains subscription and security related data as well as customer data, The U-Constructs: Four Information Drives, by I.A.  ... 
doi:10.17705/1cais.01726 fatcat:bj2ahirw75aibhp2i3nirhm44i

(U)Simmonitor: A Mobile Application For Security Evaluation Of Cellular Networks

Xenakis Christos, Ntantogian Christoforos, Panos Orestis
2016 Zenodo  
Based on this observation, this paper presents the design and implementation of a novel mobile application named (U)SimMonitor that captures and analyses the security policy that a cellular operator enforces  ...  The obtained results allow us to quantify, compare and evaluate their applied security as well as pinpoint a set of generic critical observations.  ...  Vodafone also presents a low rate of IMSI request, 4%. On the other hand, Wind depicts a high rate of IMSI request that reaches 41% for SIM cards and 55% for USIM cards.  ... 
doi:10.5281/zenodo.153964 fatcat:ss7cicp2t5gp7ohrmv25ofk2ty

U-Commerce: Expanding the Universe of Marketing

R. T. Watson, L. F. Pitt, P. Berthon, G. M. Zinkhan
2002 Journal of the Academy of Marketing Science  
This article introduces several new concepts that lay the conceptual foundation for thinking about next-generation marketing based on ubiquitous networks.  ...  U-commerce, or Über-commerce, is predicated on the characteristics of network ubiquity, universality, uniqueness, and unison.  ...  Smart cards and chips containing personal electronic information will automate personal consumption of service staples (Sheth and Sisodia 2000) .  ... 
doi:10.1177/009207002236909 fatcat:qivsklsy7bgntksikr34hnod7e

Power consumption profile analysis for security attack simulation in smart cards at high abstraction level

K. Rothbart, U. Neffe, Ch. Steger, R. Weiss, E. Rieger, A. Muehlberger
2005 Proceedings of the 5th ACM international conference on Embedded software - EMSOFT '05  
As they store and deal with confidential and secret data many attacks are performed on these cards to reveal this private information. Consequently, the security demands on smart cards are very high.  ...  This paper presents a hierarchical security attack simulation flow for smart card designs where security attacks can be simulated in the processor specific model at transaction layer 1 in SystemC.  ...  A power data file is generated while the smart card specific model is simulating.  ... 
doi:10.1145/1086228.1086268 dblp:conf/emsoft/RothbartNSWRM05 fatcat:llvehbvbrzc63ejv2zjjkkwrxa

Use of Smartphone for Supportive Supervision in Nigeria

O. Onuka, O. Madukwe, N. Chukwueme, M. Gidado, U. Emperor, K. Agbaiyero, O. Adeleke
2015 iBusiness  
Objective: Describe the value of smart phones in improving quality of supervision. Methods: This is a descriptive study.  ...  The time spent on supervision was reduced to 2 hrs per facility using the smart phones compared to 4 hrs when using the paper based at other sites.  ...  Examining the time spent on supervision portrays that there was reduction of time spent on supervision from sim card smartphones and improved network coverage report transmission to higher level is guaranteed  ... 
doi:10.4236/ib.2015.72009 fatcat:ey75ifwgqng6hfrkz7prulm2am

Electronic doorbell system using keypad and GSM

O. A. Simon, U. I. Bature, K. I. Jahun, N. M. Tahir
2020 International Journal of Informatics and Communication Technology (IJ-ICT)  
This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would  ...  <p><span lang="EN-US">In our homes or offices, security has been a vital issue.  ...  GSM messages testing codes To complete the test, these steps were followed: − A Subscriber Identification Module (SIM) card was inserted into the modem. − After uploading the system was powered off and  ... 
doi:10.11591/ijict.v9i3.pp212-220 fatcat:mrm6vsbb7jeh7jr3gp67bbq7mu

Smart Health Care System-An Easy First Aid Solution

V. Vijayashangavi, M. M., U. M., F. M., S. G.
2017 International Journal of Computer Applications  
Testing Unit Testing, Integration testing, System testing and Performance testing were carried out ensure reliability of entire Smart Healthcare System.  ...  Based on various tests carried out in various environments and conditions, Smart Health Care System has showed 95% reliability and 79% accuracy.  ... 
doi:10.5120/ijca2017915999 fatcat:cx4v4wkmjbdtjhhsl2nyebw3ye

Reference Material for Assessing Forensic SIM Tools

Wayne A. Jansen, Aurelien Delaitre
2007 2007 41st Annual IEEE International Carnahan Conference on Security Technology  
Some of the earliest, general purpose, forensic tools for cell phones targeted SIMs to recover digital evidence.  ...  It allows a forensic specialist to determine how to compensate for any shortcomings identified or whether to use one version of the tool in lieu of another.  ...  File Access Controls SIMs, as with smart cards in general, employ a range of tamper resistance techniques to protect their contents.  ... 
doi:10.1109/ccst.2007.4373494 fatcat:56i4fyvwafaytharspx26xsp5i

On the potential of high density smart cards

Keith E. Mayes, Konstantinos Markantonakis
2006 Information Security Technical Report  
Bending & twisting tests are fine for a physical card that sits in the users pocket or wallet but unnecessary as a SIM card or a PC peripheral.  ...  The former is a byte oriented protocol and is typically the default used in (U)SIM cards whereas the latter is a block protocol commonly used in banking applications such as EMV [8] cards.  ... 
doi:10.1016/j.istr.2006.05.002 fatcat:loxiqtgotnahrnjn5kbo4ev7py

Overcoming Impediments to Cell Phone Forensics

Wayne Jansen, Aurelien Delaitre, Ludovic Moenner
2008 Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)  
For example, most cell phones do not contain a hard drive and rely instead on flash memory for persistent storage.  ...  Cell phones are also designed more as specialpurpose appliances that perform a set of predefined tasks using proprietary embedded software, rather than general-purpose extensible systems that run common  ...  Either a specialized reader that accepts a SIM directly or a general-purpose reader for a full-size smart card can be used, provided that it is compatible with the PC/SC (Personal Computer/Smart Card)  ... 
doi:10.1109/hicss.2008.341 dblp:conf/hicss/JansenDM08 fatcat:q2qtca44xnhuperjkcbc6xr5ci

E-commerce applications of smart cards

David M'Raı̈hi, Moti Yung
2001 Computer Networks  
They are embedded in a plastic card that looks like a traditional magnetic stripe credit-card. We review the state of the art of e-commerce applications of smart cards.  ...  Smart cards (also called chip cards or IC-cards) are portable modest computing devices with programmable data store and certain tamper-resistance capabilities.  ...  With GemXplorer SIM card files can be edited, modified and tested using a fully graphical interface.  ... 
doi:10.1016/s1389-1286(01)00166-9 fatcat:gnlafnc3i5gltc3lbqgvm2hqey

Mobility Irregularity Detection with Smart Transit Card Data [chapter]

Xuesong Wang, Lina Yao, Wei Liu, Can Li, Lei Bai, S. Travis Waller
2020 Lecture Notes in Computer Science  
Experimental results on a large-scale dataset demonstrate that our model outperforms the state-of-the-art methods on recall, F1 score and accuracy.  ...  First, all passenger transits are fused in a certain region at a timestamp whereas each passenger has own repetitive stops and time slots.  ...  Visualization on the Passenger Pattern In order to test if distinguishable patterns were learnt, a subset of the test data is visualized on raw features and learned features u N , u N +1 (see Fig. 4)  ... 
doi:10.1007/978-3-030-47426-3_42 fatcat:o646q2ipnvfzpa5tjfdzmgpy7a

Google Android: A Comprehensive Security Assessment

A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, C. Glezer
2010 IEEE Security and Privacy  
Authentication usually occurs via SIM card and associated protocols.  ...  Prevents buffer overflows and stack smashing Mobile carrier security features Smart phones use SIM cards to authenticate and authorize user identity.  ...  Asaf Shabtai, CISSP, is a PhD student at Ben-Gurion  ... 
doi:10.1109/msp.2010.2 fatcat:xwh3y4lrxzhytau6zuu5nywqoe

Forensic Tools for Mobile Phone Subscriber Identity Modules

Wayne Jansen, Rick Ayers
2006 Journal of Digital Forensics, Security and Law  
Forensic SIM tools require either a specialized reader that accepts a SIM directly or a general-purpose reader for a full-size smart card.  ...  Standard-size smart card adapters are also available for SIMs, which allows them to be inserted into and read with a conventional smart card reader.  ... 
doi:10.15394/jdfsl.2006.1006 fatcat:krtnkudlfzfprej62m7dyt2rnq
« Previous Showing results 1 — 15 out of 1,889 results