Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security 2013
DOI: 10.1145/2484313.2484373
|View full text |Cite
|
Sign up to set email alerts
|

Sensing-enabled channels for hard-to-detect command and control of mobile devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 46 publications
(34 citation statements)
references
References 15 publications
0
34
0
Order By: Relevance
“…Out of band Control channels influencing sensors of the smart phone devices have been used for initiating attacks by presuming that a mobile malware is already installed in the device [6]. Voice channel has also been used as the covert channel for spreading the malware and for extraction of the information (i.e.…”
Section: C) Installed Third Party Applications (Substitute Messaging mentioning
confidence: 99%
See 3 more Smart Citations
“…Out of band Control channels influencing sensors of the smart phone devices have been used for initiating attacks by presuming that a mobile malware is already installed in the device [6]. Voice channel has also been used as the covert channel for spreading the malware and for extraction of the information (i.e.…”
Section: C) Installed Third Party Applications (Substitute Messaging mentioning
confidence: 99%
“…These attacks are capable of providing stimulus to the Malware already preinstalled in the Smart phone device [6], spreading the malware across several non infected devices [6], covertly transferring the vital Information stored within the Smart phone device [7] and launching Denial of service [8,10] and Sleep deprivation attacks [10]. These attacks are mentioned in Table 1 and the possibility of achieving the same functionality by means of utilizing the Cellular Infrastructure is briefly defined in the corresponding subsections.…”
Section: Attacks Based On Channelsmentioning
confidence: 99%
See 2 more Smart Citations
“…The presence of increasingly powerful computing, networking, and sensing functions in smartphones has empowered malicious apps with a variety of advanced capabilities [2], including the possibility to determine the physical location of the smartphone, spy on the user's behavioral patterns, or compromise the data and services accessed through the device. These capabilities are rapidly giving rise to a new generation of targeted malware that makes decisions on the basis of factors such as the device location, the user's profile, or the presence of other apps (e.g., see [3][4][5][6]). …”
Section: Introductionmentioning
confidence: 99%