Cyber attacks targeting Android cellphones
Title | Cyber attacks targeting Android cellphones |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Varol, N., Aydogan, A. F., Varol, A. |
Conference Name | 2017 5th International Symposium on Digital Forensic and Security (ISDFS) |
Date Published | April 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5090-5835-8 |
Keywords | Android (operating system), android encryption, Android operated cellphone control, Android smartphone, application based attacks, Application Based Mobile Attackers, Cameras, cellphone camera, computer software, conversation eavesdropping, Cyber Attacks, Encryption, frequency based attacks, Frequency Based Mobile Attackers, GSM, Human Behavior, human factors, Metrics, mobile attack approaches, Mobile communication, mobile computing, mobile phones, Primary Mobile Hack Builder, primary mobile hack builder software, pubcrawl, radiocommunication, resilience, Resiliency, Scalability, security of data, smart phones, SMS information, Software, software based radio circuit |
Abstract | Mobile attack approaches can be categorized as Application Based Attacks and Frequency Based Attacks. Application based attacks are reviewed extensively in the literature. However, frequency based attacks to mobile phones are not experimented in detail. In this work, we have experimentally succeeded to attack an Android smartphone using a simple software based radio circuit. We have developed a software "Primary Mobile Hack Builder" to control Android operated cellphone as a distance. The SMS information and pictures in the cellphone can be obtained using this device. On the other hand, after launching a software into targeting cellphone, the camera of the cellphone can be controlled for taking pictures and downloading them into our computers. It was also possible to eavesdropping the conversation. |
URL | http://ieeexplore.ieee.org/document/7916511/ |
DOI | 10.1109/ISDFS.2017.7916511 |
Citation Key | varol_cyber_2017 |
- resilience
- mobile attack approaches
- Mobile communication
- mobile computing
- mobile phones
- Primary Mobile Hack Builder
- primary mobile hack builder software
- pubcrawl
- radiocommunication
- Metrics
- Resiliency
- Scalability
- security of data
- smart phones
- SMS information
- Software
- software based radio circuit
- conversation eavesdropping
- android encryption
- Android operated cellphone control
- Android smartphone
- application based attacks
- Application Based Mobile Attackers
- Cameras
- cellphone camera
- computer software
- Android (operating system)
- Cyber Attacks
- encryption
- frequency based attacks
- Frequency Based Mobile Attackers
- GSM
- Human behavior
- Human Factors