Review of malicious mobile applications, phone bugs and other cyber threats to mobile devices . Proceedings of 2013 5th IEEE International Conference on Broadband Network and Multimedia Technology, IEEE IC-BNMT 2013 2013, Article number 6823962, Pages

14 сентября 2018
225
Предметная область
Выходные данные
Ключевые слова
Вид публикации Тематический материал
Контактные данные автора публикации Mikhaylov, D., Zhukov, I., Starikovskiy, A. , Kharkov, S., Tolstaya, A., Zuykov, A. Youth Engineering Centre, National Research Nuclear University MEPhI
Ссылка на публикацию в интернете www.scopus.com/record/display.url?origin=recordpage&eid=2-s2.0-84903289289&citeCnt=3&noHighlight=false&sort=plf-f&src=s&st1=MEPhI&nlo=&nlr=&nls=&sid=F0743CC1BB1CEC168410A18CB87C48A7.Vdktg6RVtMfaQJ4pNTCQ:6500&sot=b&sdt=b&sl=31&s=AFFIL(MEPhI) AND PU

Аннотация

Modern mobile phones access the Internet and perform a wide range of functions and, therefore, there is a diversity of possible types of attack by malware or other forms of malicious communications that can be launched against a mobile device. Malicious bug installed on the phone enables an attacker to control the infected mobile device remotely. In particular, perform the commands sent from a server of the cyber-criminal, install different applications, and change the settings in the phones browser. The victim can be signed up for a paid service by having a message sent from his or her number, the victims personal data (i.e., contacts, messages, call logs, etc.) can be obtained and given to spammers, the victims location can be obtained as well. Moreover, there is a possibility of involving the owner of the phone in fraudulent scheme without his knowledge. This paper deals with the possible attacks that the mobile phone user may suffer if the device is controlled by the intruder through the bug. © 2013 IEEE.



--------------------------------------------------------------------------------


Author keywords

Bookmark; Bug; Malicious code insertion; Malware
Подробнее
Для того чтобы оставить комментарий необходимо авторизоваться.