scispace - formally typeset
Open AccessJournal ArticleDOI

Trojan horses in mobile devices

TLDR
This paper describes the communication links through a Trojan horse installed into a mobile device and proposes different solutions to avoid this malware and its effects.
Abstract
This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a user’s contacts information through the previous installation of the Trojan horse. The results show that this process means a loss of information and a quantified cost to the attacked user too. This paper proposes different solutions to avoid this malware and its effects.

read more

Content maybe subject to copyright    Report

Citations
More filters

Design of a hybrid command and control mobile botnet: Presentation

H Pieterse, +1 more
TL;DR: 8th International Conference on Information Warfare and Security (ICIW), Denver, Colorado, USA, 25-26 March 2013
Dissertation

Design of a hybrid command and control mobile botnet

TL;DR: In this paper, the Journal of Information Warfare, vol. 12(1), pp 70-82, is published, which is an ABSTRACT version of this article. And the definitive version of the article is published in the same year.
Journal ArticleDOI

FPGA-Based Hardware Architecture for Fuzzy Homomorphic Enhancement Based on Partial Differential Equations

TL;DR: An efficient, high speed hardware architecture for a PDE-based variational fuzzy homomorphic color image enhancement algorithm for both RGB and HSI/HSV color space variants by utilizing an easily implementable fuzzy membership function with a high boost emphasis filter characteristic.

All Bot Net: A Need for Smartphone P2P Awareness

TL;DR: This paper is a call for law enforcement and other members of the digital forensic community to be aware of smartphones connecting to Peer-to-Peer networks.
References
More filters
Proceedings ArticleDOI

The effect of network topology on the spread of epidemics

TL;DR: This paper identifies topological properties of the graph that determine the persistence of epidemics and shows that if the ratio of cure to infection rates is larger than the spectral radius of thegraph, then the mean epidemic lifetime is of order log n, where n is the number of nodes.
Journal ArticleDOI

Email networks and the spread of computer viruses.

TL;DR: Empirically the structure of this network of connections between individuals over which the virus spreads is investigated using data drawn from a large computer installation, and the implications for the understanding and prevention of computer virus epidemics are discussed.
Proceedings ArticleDOI

Behavioral detection of malware on mobile handsets

TL;DR: A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devices and indicates that behavioral detection can identify current mobile viruses and worms with more than 96% accuracy.
Proceedings ArticleDOI

On Mobile Viruses Exploiting Messaging and Bluetooth Services

TL;DR: The results reveal that hybrid worms that use SMS/MMS and proximity scanning (via Bluetooth) can spread rapidly within a cellular network, making them potential threats in public meeting places such as sports stadiums, train stations, and airports.
Journal ArticleDOI

An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks

TL;DR: This paper proposes a general framework based on the principles of epidemic theory, for vulnerability analysis of current broadcast protocols in wireless sensor networks, and develops a common mathematical model for the propagation that incorporates important parameters derived from the communication patterns of the protocol under test.
Related Papers (5)