2017
DOI: 10.1051/itmconf/20171204011
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Leaks through Data Hijacking Attack on Mobile Systems

Abstract: Abstract-To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 11 publications
(7 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?