Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Edith Cowan University

Research outputs 2012

Information Security

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

User Reaction Towards End User License Agreements On Android Smartphones, Hamish Cotton, Christopher Bolan Jan 2012

User Reaction Towards End User License Agreements On Android Smartphones, Hamish Cotton, Christopher Bolan

Research outputs 2012

Smartphones are increasingly recognized as the most popular computing platform, forming an integral part of the way users interact with the online world. Accompanied with the advent of user-installed content, End User License Agreements have surfaced mirroring issues previously arising on more traditional platforms. This survey conducted in Perth, Western Australia looked at user behavior when viewing and accepting EULAs on smartphone devices. The results show that a majority of users do not read such agreements citing issues of readability and length.


Utilizing The Rfid Lock Command Against Multiple Targets, Christopher Bolan Jan 2012

Utilizing The Rfid Lock Command Against Multiple Targets, Christopher Bolan

Research outputs 2012

An unlocked Electronic Product Code (EPC) tag allows for issuance of most commands without the need for any authorization. This means that a system with unlocked tags would allow any attacker to modify tag data at will, whilst also opening the door to a range of other misuse. One possible avenue of active misuse against unlocked tags would be to issue LockID commands and ‘permanently’ lock some or all of a system‘s RFID tags. As this attack is simply an issuance of a valid command it fits firmly in the category of an active misuse and could also be considered …