2023
DOI: 10.3390/technologies11030076
|View full text |Cite
|
Sign up to set email alerts
|

Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

Abstract: There is an exponential rise in the use of smartphones in government and private institutions due to business dependencies such as communication, virtual meetings, and access to global information. These smartphones are an attractive target for cybercriminals and are one of the leading causes of cyber espionage and sabotage. A large number of sophisticated malware attacks as well as advanced persistent threats (APTs) have been launched on smartphone users. These attacks are becoming significantly more complex,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 236 publications
0
2
0
Order By: Relevance
“…Lu et al 12 Alotaibi et al 13 Patidar et al 14 Liu et al 15 Alghawazi et al 16 Saini et al 17 Sheth et al 18 Okesola et al 19 Labib et al 20 Marashdih et al 21 Mehta et al 22 Henry et al 23 Pruzinec et al 24 Irungu et al 25 Fratty et al 26 Logozzo et al 27 Singh et al 28 Crespo-Martínez et al 29 Fu et al 30 Philip et al 31 Barsellotti et al 32 Mallissery et al 33 Lu et al 12 Alotaibi et al 13 Guan et al 34 Nasrullayev et al 35 Muhammad et al 36 Brintha et al 37 Al Badri et al [36] Lu et al 12 (2023)…”
Section: Parse Tree Validation Policy Enforcement Isr Taint Tracking ...mentioning
confidence: 99%
“…Lu et al 12 Alotaibi et al 13 Patidar et al 14 Liu et al 15 Alghawazi et al 16 Saini et al 17 Sheth et al 18 Okesola et al 19 Labib et al 20 Marashdih et al 21 Mehta et al 22 Henry et al 23 Pruzinec et al 24 Irungu et al 25 Fratty et al 26 Logozzo et al 27 Singh et al 28 Crespo-Martínez et al 29 Fu et al 30 Philip et al 31 Barsellotti et al 32 Mallissery et al 33 Lu et al 12 Alotaibi et al 13 Guan et al 34 Nasrullayev et al 35 Muhammad et al 36 Brintha et al 37 Al Badri et al [36] Lu et al 12 (2023)…”
Section: Parse Tree Validation Policy Enforcement Isr Taint Tracking ...mentioning
confidence: 99%
“…These physical devices may include flaws that adversaries might exploit through side-channel attacks to sensitive healthcare information, such as cryptographic keys and passwords. Muhammad et al [76] and Niksirat et al [27] defined side-channel attacks in smart healthcare as security threats in which adversaries exploit unplanned information leakage from various channels and computing devices by analyzing physical parameters during their regular operation to collect sensitive healthcare information, such as cryptographic keys and passwords, and send it to a third party. In side-channel and secret attacks, attackers assume that data constantly leak from communication channels such as power consumption, electromagnetic radiation, and timing analysis, which they must exploit [27][77].…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…Second, investigating the relationship between trust and knowledge sheds light on the psychological effects of call spoofing on user behavior [5]. Last but not least, recognizing demographic variances enables treatments and countermeasures to be tailored to certain user groups, addressing the particular difficulties encountered by various Indian population segments [6].…”
Section: Introductionmentioning
confidence: 99%