Rootkits on Smart Phones: Attacks and Implications
ثبت نشده
چکیده
Smart phones are increasingly being equipped with operating systems that compare in complexity with those on desktop computers. This trend makes smart phone operating systems vulnerable to many of the same threats as desktop operating systems. This paper examines the threat posed by rootkits to smart phones. Rootkits are malware that stealthily achieve their goals by modifying operating system code and data, and have long been a problem for desktops. However, smart phones expose several unique interfaces, such as voice, GPS and battery, that rootkits can exploit in novel ways. These attacks can have serious social consequences, ranging from loss of privacy to denial of service during emergencies. This paper demonstrates the threat of smart phone rootkits with three novel attacks. We implemented rootkits that allow a remote attacker to: (1) snoop on a victim’s confidential conversations; (2) snoop on a victim’s geographical location; and (3) stealthily exhaust the battery on a victim’s phone. We also discuss the social implications of each of these attacks.
منابع مشابه
A Review on Android Authentication System Vulnerabilities
Mobile security has become a crucial aspect of mobile computing. People are maintaining their confidential and valuable information on smart phones. Most of the users and businesses use smart phones as message tools, and means of scheduling and establishing their work and private life. Smart phones contain increasing amount of exposed information to which access must be prohibited. But security...
متن کاملSmartphones and Our Students:A Case of Undergraduate Students in an EFL Context
Immoderate smart phone usage usually makes the students addicted to it and spends less time reading lecture notes and textbooks. This study aims to determine university students' usage of smart phones and perceived rejection of paper books in an EFL context. The study collected data through a 20-item structured questionnaire consisting of the general characteristics, the number and hours of gen...
متن کاملAutomated containment of rootkits attacks
Rootkit attacks are a serious threat to computer systems. Packaged with other malware such as worms, viruses and spyware, rootkits pose a more potent threat than ever before by allowing malware to evade detection. In the absence of appropriate tools to counter such attacks, compromised machines stay undetected for extended periods of time. Leveraging virtual machine technology, we propose a sol...
متن کاملPaladin: Automated Detection and Containment of Rootkit Attacks
Rootkit attacks are a serious threat to computer systems. Packaged with other malware like worms, viruses and spyware, rootkits pose a more potent threat than ever before by allowing the malware to evade detection. In the absence of appropriate tools to counter such attacks, compromised machines stay undetected for extended periods of time. Leveraging virtual machine technology, we propose a so...
متن کاملRelationship between Quality of Life and Using Smart Phones in the Elderly
Aim(s): Aging is an important period of life, and attention to the issues and needs of this period is socially important because they can eclipse the quality of life of the elderly. Today, the use of cell phones especially smart cell phones among elderly has also increased. The purpose of this study was to determine the relationship between quality of life and the use of smart cell phones in th...
متن کامل