Deakin University
Browse

File(s) under permanent embargo

Smartphone malware based on synchronisation vulnerabilities

conference contribution
posted on 2011-01-01, 00:00 authored by Moutaz Alazab, A Alazab, Lynn BattenLynn Batten
Smartphones are mobile phones that offer processing power and features like personal computers (PC) with the aim of improving user productivity as they allow users to access and manipulate data over networks and Internet, through various mobile applications. However, with such anywhere and anytime functionality, new security threats and risks of sensitive and personal data are envisaged to evolve. With the emergence of open mobile platforms that enable mobile users to install applications on their own, it opens up new avenues for propagating malware among various mobile users very quickly. In particular, they become crossover targets of PC malware through the synchronization function between smartphones and computers. Literature lacks detailed analysis of smartphones malware and synchronization vulnerabilities. This paper addresses these gaps in literature, by first identifying the similarities and differences between smartphone malware and PC malware, and then by investigating how hackers exploit synchronization vulnerabilities to launch their attacks.

History

Event

International Conference on Information Technology and Applications (7th : 2011 : Sydney, N.S.W.)

Pagination

1 - 6

Publisher

ICITA

Location

Sydney, N.S.W.

Place of publication

Sydney, N.S.W.

Start date

2011-11-21

End date

2011-11-24

ISBN-13

9780980326741

Language

eng

Publication classification

E1 Full written paper - refereed

Copyright notice

2011, ICITA

Title of proceedings

ICITA 2011 : Proceedings of the 7th International Conference on Information Technology and Applications

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC