Exploration of Attacks on Current Generation Smartphones
نویسندگان
چکیده
منابع مشابه
Exploration of Attacks on Current Generation Smartphones
Due to the ever increasing capabilities of current generation smartphones, they are quickly becoming more attractive targets for malicious attackers. The potential of porting attacks and malware from modern computers to these mobile devices is becoming a reality. In this paper, we explore the possibility of staging some attacks on the 802.11 network interface which is common to all smartphones....
متن کاملA Survey on Malware Attacks on Smartphones
Today, smartphone has become a part of our everyday lives since they enable us to access variety of services in time . At present , the usage of these mobile services has significantly increased due to the different forms of connectivity provided by smartphones, such as GPRS, Bluetooth and Wi-Fi. At the same time , the number of vulnerabilities exploiting these services and communication channe...
متن کاملGraphNeighbors: Hampering Shoulder-Surfing Attacks on Smartphones
Today, smartphones are widely used and they already have a growing market share of more than 70% according to recent studies. These devices often contain sensitive data like contacts, pictures, or even passwords that can easily be accessed by an attacker if the phone is not locked. Since they are mobile and used as everyday gadgets, they are susceptible to get lost or stolen. Hence, access cont...
متن کاملCurrent Attacks on NTRU
Acknowledgements I should thank many people who have helped me on the way of writing and then righting what you read now. I start with my family, whose love and support have been the very foundation of all my studies. I thank Professor Buchmann, who interested me in the field of lattice cryptography and arranged this thesis. I thank my first supervisor Christoph Ludwig, for many talks about lat...
متن کاملMoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
Runtime and control-flow attacks (such as code injection or return-oriented programming) constitute one of the most severe threats to software programs. These attacks are prevalent and have been recently applied to smartphone applications as well, of which hundreds of thousands are downloaded by users every day. While a framework for control-flow integrity (CFI) enforcement, an approach to proh...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2011
ISSN: 1877-0509
DOI: 10.1016/j.procs.2011.07.071