• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Mobile Phone and Infrastructure Vulnerabilities

Kannan, Prasanna, Krasniqi, Nesret January 2007 (has links)
The first mobile threat that appeared in the year 2004, that is Cabir.A has shown that mobile phone threat is a proof-of -concept application. However, most Symbian malwares are still quite primitive and not in the form of executable code. It is able to replicate itself via Bluetooth devices supporting Symbian Series 60 user interface platform. To date (October 2007), Cabir.A has been widespread over many countries such as Malaysia, United States, United Kingdom, Italy, Russia, Indonesia, Japan, Singapore, Australia and New Zealand.The current target for mobile phone attacks has a certain focus on the Symbian Series 60 user interface platform mainly because of its increasing market share. The vulnerabilities of the years 2005 and 2006 have included more than 120 types of variants and new virus attacks has been using Cabir variants as a basis to create more dangerous and damageable malware.At the beginning of 2005 the main types of mobile malware had matured and were used by virus writers over the next eighteen months, including the following:1. Worms that spread via Smartphone protocols and services2. Vandal Trojans that install themselves in the system by exploiting Symbian design faults3. Trojans designed for financial gainThere are only a few main types of behavior but in practice mobile malware comes in a multitude of forms. / Uppsatsnivå: D

Page generated in 0.115 seconds