3.1 Improved Security Code Generation The security code defined by (1) is generated in the activation protocol. ... who gets hold of a usera#39;s mobile phone can determine the IMEI number of the phone and read the memory where the client reference is stored. ... in cleartext, then the attacker could record these values, and exhaustively try all different PINs to generate the set of possible security codes.
|Title||:||Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices|
|Author||:||Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron|
|Publisher||:||Springer - 2010-04-07|