Trojan horses in mobile devices
Daniel Fuentes,Juan Antonio Álvarez-García,Juan Antonio Ortega,Luis Gonzalez-Abril,Francisco Velasco +4 more
TLDR
This paper describes the communication links through a Trojan horse installed into a mobile device and proposes different solutions to avoid this malware and its effects.Abstract:
This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a user’s contacts information through the previous installation of the Trojan horse. The results show that this process means a loss of information and a quantified cost to the attacked user too. This paper proposes different solutions to avoid this malware and its effects.read more
Citations
More filters
Journal ArticleDOI
How persuasive is a phishing email? A phishing game for phishing awareness
Design of a hybrid command and control mobile botnet: Presentation
H Pieterse,M Olivier +1 more
TL;DR: 8th International Conference on Information Warfare and Security (ICIW), Denver, Colorado, USA, 25-26 March 2013
Dissertation
Design of a hybrid command and control mobile botnet
TL;DR: In this paper, the Journal of Information Warfare, vol. 12(1), pp 70-82, is published, which is an ABSTRACT version of this article. And the definitive version of the article is published in the same year.
Journal ArticleDOI
FPGA-Based Hardware Architecture for Fuzzy Homomorphic Enhancement Based on Partial Differential Equations
TL;DR: An efficient, high speed hardware architecture for a PDE-based variational fuzzy homomorphic color image enhancement algorithm for both RGB and HSI/HSV color space variants by utilizing an easily implementable fuzzy membership function with a high boost emphasis filter characteristic.
All Bot Net: A Need for Smartphone P2P Awareness
TL;DR: This paper is a call for law enforcement and other members of the digital forensic community to be aware of smartphones connecting to Peer-to-Peer networks.
References
More filters
Proceedings ArticleDOI
The effect of network topology on the spread of epidemics
TL;DR: This paper identifies topological properties of the graph that determine the persistence of epidemics and shows that if the ratio of cure to infection rates is larger than the spectral radius of thegraph, then the mean epidemic lifetime is of order log n, where n is the number of nodes.
Journal ArticleDOI
Email networks and the spread of computer viruses.
TL;DR: Empirically the structure of this network of connections between individuals over which the virus spreads is investigated using data drawn from a large computer installation, and the implications for the understanding and prevention of computer virus epidemics are discussed.
Proceedings ArticleDOI
Behavioral detection of malware on mobile handsets
TL;DR: A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devices and indicates that behavioral detection can identify current mobile viruses and worms with more than 96% accuracy.
Proceedings ArticleDOI
On Mobile Viruses Exploiting Messaging and Bluetooth Services
Abhijit Bose,K.G. Shin +1 more
TL;DR: The results reveal that hybrid worms that use SMS/MMS and proximity scanning (via Bluetooth) can spread rapidly within a cellular network, making them potential threats in public meeting places such as sports stadiums, train stations, and airports.
Journal ArticleDOI
An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks
P K De,Yonghe Liu,Sajal K. Das +2 more
TL;DR: This paper proposes a general framework based on the principles of epidemic theory, for vulnerability analysis of current broadcast protocols in wireless sensor networks, and develops a common mathematical model for the propagation that incorporates important parameters derived from the communication patterns of the protocol under test.