Anwar et al., 2015 - Google Patents
Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugsAnwar et al., 2015
View PDF- Document ID
- 18320256128650793807
- Author
- Anwar Z
- Khan W
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
Covert listening devices—a combination of a miniature radio transmitter and a microphone— have been used as key espionage instruments as early as the mid‐20th century. More recently, hackers have started exploiting inherent weaknesses in current mobile platforms …
- 238000000034 method 0 abstract description 36
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/66—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3706022B1 (en) | Permissions policy manager to configure permissions on computing devices | |
US12081540B2 (en) | Configuring access to a network service based on a security state of a mobile device | |
US12026261B2 (en) | Quarantine of software by an evaluation server based on authenticity analysis of user device data | |
US11741222B2 (en) | Sandbox environment for document preview and analysis | |
US11979370B2 (en) | Event-driven malware detection for mobile devices | |
US11259183B2 (en) | Determining a security state designation for a computing device based on a source of software | |
US10924517B2 (en) | Processing network traffic based on assessed security weaknesses | |
La Polla et al. | A survey on security for mobile devices | |
Teufl et al. | Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) | |
Al-Turjman et al. | Cyber security in mobile social networks | |
Zaidi et al. | A survey on security for smartphone device | |
BalaGanesh et al. | Smart devices threats, vulnerabilities and malware detection approaches: a survey | |
Anwar et al. | Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs | |
Hamandi et al. | Messaging attacks on android: vulnerabilities and intrusion detection | |
Azam et al. | Security source code analysis of applications in Android OS | |
Bente | Towards a network-based approach for smartphone security | |
Armin | Mobile threats and the underground marketplace | |
Pistol et al. | Simulation Of New Methods Using Applications Which Exflitrate Data From Android Phones | |
Siadati | Prevention, detection, and reaction to cyber impersonation attacks | |
Sif-Eddine et al. | Mobile Applications Security: A Survey About Security Level and Awareness of Moroccan Users | |
Ortega et al. | A novel approach to Trojan horse detection in mobile phones messaging and bluetooth services | |
Roseline | Intrusion Detection for Unsolicited Short-Message Services in Mobile Devices | |
Asparuhov | BYOD-Risks, Solutions and Guidelines | |
EXCELLENCE | Deliverable D4. 2: Second Report on Threats on the Future Internet and Research Roadmap | |
Akinbami | Analysis and evaluation of the security concerns of VoIP services on smart phones: a case study of the Android-based phones. |