Smartphone malware based on synchronisation vulnerabilities

Alazab, Moutaz, Alazab, Ammar and Batten, Lynn 2011, Smartphone malware based on synchronisation vulnerabilities, in ICITA 2011 : Proceedings of the 7th International Conference on Information Technology and Applications, ICITA, Sydney, N.S.W., pp. 1-6.

Attached Files
Name Description MIMEType Size Downloads

Title Smartphone malware based on synchronisation vulnerabilities
Author(s) Alazab, Moutaz
Alazab, Ammar
Batten, Lynn
Conference name International Conference on Information Technology and Applications (7th : 2011 : Sydney, N.S.W.)
Conference location Sydney, N.S.W.
Conference dates 21-24 Nov. 2011
Title of proceedings ICITA 2011 : Proceedings of the 7th International Conference on Information Technology and Applications
Editor(s) [Unknown],
Publication date 2011
Conference series International Conference on Information Technology and Applications
Start page 1
End page 6
Total pages 6
Publisher ICITA
Place of publication Sydney, N.S.W.
Keyword(s) malware
anti-virus
smartphone malware
synchronization vulnerabilities
Summary Smartphones are mobile phones that offer processing power and features like personal computers (PC) with the aim of improving user productivity as they allow users to access and manipulate data over networks and Internet, through various mobile applications. However, with such anywhere and anytime functionality, new security threats and risks of sensitive and personal data are envisaged to evolve. With the emergence of open mobile platforms that enable mobile users to install applications on their own, it opens up new avenues for propagating malware among various mobile users very quickly. In particular, they become crossover targets of PC malware through the synchronization function between smartphones and computers. Literature lacks detailed analysis of smartphones malware and synchronization vulnerabilities. This paper addresses these gaps in literature, by first identifying the similarities and differences between smartphone malware and PC malware, and then by investigating how hackers exploit synchronization vulnerabilities to launch their attacks.
ISBN 9780980326741
Language eng
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
HERDC collection year 2011
Copyright notice ©2011, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30045399

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 224 Abstract Views, 7 File Downloads  -  Detailed Statistics
Created: Thu, 17 May 2012, 11:33:57 EST by Barb Robertson

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.