2013
DOI: 10.1007/s00779-013-0739-y
|View full text |Cite
|
Sign up to set email alerts
|

Dangerous Wi-Fi access point: attacks to benign smartphone applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
2

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 23 publications
0
11
0
2
Order By: Relevance
“…Thus, the evaluations of Information and service quality are determined by mobile app quality itself, whereas system quality has relevance to both mobile app and mobile service provider. Mobile apps require an access to the internet, and most users prefer wi-fi networks which are free to use (Park et al 2014). Most users of wireless networks know that the access of mobile apps using wi-fi doesn't guarantee the stable connection.…”
Section: Resultsmentioning
confidence: 99%
“…Thus, the evaluations of Information and service quality are determined by mobile app quality itself, whereas system quality has relevance to both mobile app and mobile service provider. Mobile apps require an access to the internet, and most users prefer wi-fi networks which are free to use (Park et al 2014). Most users of wireless networks know that the access of mobile apps using wi-fi doesn't guarantee the stable connection.…”
Section: Resultsmentioning
confidence: 99%
“…In order to sniff only network traffic generated by the examined applications and not by other services and programs running in the background, an separated hotspot was created in order to avoid interference from devices or applications on the same network. Similar to authors of previous works (Park, Choi, Eom, & Chung, 2014) in creating a hotspot in order to meet this very important pre requisite. The Asus Nexus 7 Google tablet was placed on a separate network established using Connectify (2016.0.3.36821 Pro) which allowed having a hotspot with specific IP addresses and this separated the Asus Nexus 7 Google tablet's IP address from the local network.…”
Section: Experiments Setupmentioning
confidence: 72%
“…Extra steps are needed to ensure that the detection scheme works for both scenarios. Work [9] demonstrated how Android applications can be exploited using MITM attacks with DNS spoofing. It also pointed out various security holes in the Android security model.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, as in works [13,3,11,10,9] the main aim of this document is to raise awareness of the dangers of MITM attacks. We demonstrated the methods that could be used by attackers, and provided appropriate methods and things to consider in order to stay safe, and keep our information private.…”
Section: Introductionmentioning
confidence: 98%