Visible to the public Cyber attacks targeting Android cellphones

TitleCyber attacks targeting Android cellphones
Publication TypeConference Paper
Year of Publication2017
AuthorsVarol, N., Aydogan, A. F., Varol, A.
Conference Name2017 5th International Symposium on Digital Forensic and Security (ISDFS)
Date PublishedApril 2017
PublisherIEEE
ISBN Number978-1-5090-5835-8
KeywordsAndroid (operating system), android encryption, Android operated cellphone control, Android smartphone, application based attacks, Application Based Mobile Attackers, Cameras, cellphone camera, computer software, conversation eavesdropping, Cyber Attacks, Encryption, frequency based attacks, Frequency Based Mobile Attackers, GSM, Human Behavior, human factors, Metrics, mobile attack approaches, Mobile communication, mobile computing, mobile phones, Primary Mobile Hack Builder, primary mobile hack builder software, pubcrawl, radiocommunication, resilience, Resiliency, Scalability, security of data, smart phones, SMS information, Software, software based radio circuit
Abstract

Mobile attack approaches can be categorized as Application Based Attacks and Frequency Based Attacks. Application based attacks are reviewed extensively in the literature. However, frequency based attacks to mobile phones are not experimented in detail. In this work, we have experimentally succeeded to attack an Android smartphone using a simple software based radio circuit. We have developed a software "Primary Mobile Hack Builder" to control Android operated cellphone as a distance. The SMS information and pictures in the cellphone can be obtained using this device. On the other hand, after launching a software into targeting cellphone, the camera of the cellphone can be controlled for taking pictures and downloading them into our computers. It was also possible to eavesdropping the conversation.

URLhttp://ieeexplore.ieee.org/document/7916511/
DOI10.1109/ISDFS.2017.7916511
Citation Keyvarol_cyber_2017