Exploration of Attacks on Current Generation Smartphones
نویسندگان
چکیده
Due to the ever increasing capabilities of current generation smartphones, they are quickly becoming more attractive targets for malicious attackers. The potential of porting attacks and malware from modern computers to these mobile devices is becoming a reality. In this paper, we explore the possibility of staging some attacks on the 802.11 network interface which is common to all smartphones. We begin by explaining and carrying out the exploitation of the SSH vulnerability on jailbroken iPhones that was discovered in late 2009. This paper then looks at simple network flooding attacks with the intention of causing a simple denial of service by depleting the battery life of the device. It is also our intention to show that these flooding attacks can be carried out utilizing a smartphone as the aggressor in order to attack other mobile devices and that the procedure for such attacks is not difficult. A simple tool is developed in order to carry out these attacks and to show that even though these attacks are relatively simple, they can have profound effects.
منابع مشابه
Cellpot: A Concept for Next Generation Cellular Network Honeypots
Smartphones have been shown to be vulnerable. Similarly, cellular networks have been shown to be vulnerable to denial of service attacks through signaling. Attackers can use compromised smartphones to remotely attack the cellular network. Therefore the mobile network operator requires measures to detect and mitigate attacks as they emerge. In the past honeypots proved to be a valuable tool to d...
متن کاملCompact Software Implementation of AES on Atomic Smartphones Architecture
The smartphones have enhanced the way of life of present day generation in terms of businesses, communications, Internet browsing and so on. The hardware architecture of smartphones is becoming compact year by year due to reduction in the number of gates used, latency cycles and data paths. However, security plays a major role in order to enjoy optimally the functionalities of smartphones. This...
متن کاملPoster: HoneyDroid - Creating a Smartphone Honeypot
Attacks against smartphones are becoming commonplace today, especially since they are connected to the Internet at all times. Current attacks range from worms and botnets [9], to user installed Trojans [8]. New vulnerabilities in smartphones emerge fast particularly since today’s smartphones are based on common software libraries such as the Linux kernel or the WebKit browser engine. In order t...
متن کاملPhenomenological exploration of young people sexual understanding
Introduction: In our current society, there is a lot of complexity and diversity of behavior, given that, Sexual understanding is one of the things that stresses and our young people generation doesnchr('39')t know how to deal with it. Therefore, it is necessary to analyze the of young people sexual understanding and the purpose of this study was to explore the young people sexual understanding...
متن کاملA Survey on Security for Smartphone Device
The technological advancements in mobile connectivity services such as GPRS, GSM, 3G, 4G, Blue-tooth, WiMAX, and Wi-Fi made mobile phones a necessary component of our daily lives. Also, mobile phones have become smart which let the users perform routine tasks on the go. However, this rapid increase in technology and tremendous usage of the smartphones make them vulnerable to malware and other s...
متن کامل