[go: up one dir, main page]

Anwar et al., 2015 - Google Patents

Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs

Anwar et al., 2015

View PDF
Document ID
18320256128650793807
Author
Anwar Z
Khan W
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

Covert listening devices—a combination of a miniature radio transmitter and a microphone— have been used as key espionage instruments as early as the mid‐20th century. More recently, hackers have started exploiting inherent weaknesses in current mobile platforms …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
    • H04M1/725Cordless telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/66Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling

Similar Documents

Publication Publication Date Title
EP3706022B1 (en) Permissions policy manager to configure permissions on computing devices
US12081540B2 (en) Configuring access to a network service based on a security state of a mobile device
US12026261B2 (en) Quarantine of software by an evaluation server based on authenticity analysis of user device data
US11741222B2 (en) Sandbox environment for document preview and analysis
US11979370B2 (en) Event-driven malware detection for mobile devices
US11259183B2 (en) Determining a security state designation for a computing device based on a source of software
US10924517B2 (en) Processing network traffic based on assessed security weaknesses
La Polla et al. A survey on security for mobile devices
Teufl et al. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
Al-Turjman et al. Cyber security in mobile social networks
Zaidi et al. A survey on security for smartphone device
BalaGanesh et al. Smart devices threats, vulnerabilities and malware detection approaches: a survey
Anwar et al. Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs
Hamandi et al. Messaging attacks on android: vulnerabilities and intrusion detection
Azam et al. Security source code analysis of applications in Android OS
Bente Towards a network-based approach for smartphone security
Armin Mobile threats and the underground marketplace
Pistol et al. Simulation Of New Methods Using Applications Which Exflitrate Data From Android Phones
Siadati Prevention, detection, and reaction to cyber impersonation attacks
Sif-Eddine et al. Mobile Applications Security: A Survey About Security Level and Awareness of Moroccan Users
Ortega et al. A novel approach to Trojan horse detection in mobile phones messaging and bluetooth services
Roseline Intrusion Detection for Unsolicited Short-Message Services in Mobile Devices
Asparuhov BYOD-Risks, Solutions and Guidelines
EXCELLENCE Deliverable D4. 2: Second Report on Threats on the Future Internet and Research Roadmap
Akinbami Analysis and evaluation of the security concerns of VoIP services on smart phones: a case study of the Android-based phones.