2010 5th International Conference on Malicious and Unwanted Software 2010
DOI: 10.1109/malware.2010.5665790
|View full text |Cite
|
Sign up to set email alerts
|

Rise of the iBots: Owning a telco network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 62 publications
(27 citation statements)
references
References 5 publications
0
27
0
Order By: Relevance
“…Hua et al [8] analyzed the impact of network topology on dissemination cost of bot commands over SMS-based mobile botnets. Mulliner et al [9] and Anagnostopoulos et al [10] proposed mobile botnets that use a hybrid of SMS, HTTP, and/or Bluetooth as a C&C medium. There also exists an SMS-based Trojan [11] that causes financial loss to users by sending messages to premium rate numbers without the users' recognition.…”
Section: Related Workmentioning
confidence: 99%
“…Hua et al [8] analyzed the impact of network topology on dissemination cost of bot commands over SMS-based mobile botnets. Mulliner et al [9] and Anagnostopoulos et al [10] proposed mobile botnets that use a hybrid of SMS, HTTP, and/or Bluetooth as a C&C medium. There also exists an SMS-based Trojan [11] that causes financial loss to users by sending messages to premium rate numbers without the users' recognition.…”
Section: Related Workmentioning
confidence: 99%
“…The second issue with mobile botnets is their use of SMS messages for their Command and Control (C&C) communication, as demonstrated by Mulliner et al in [19]. Their proofof-concept bot uses SMS messages for delivering the C&C messages between the nodes of the botnet.…”
Section: A Hijacked Phones and Mobile Botnetsmentioning
confidence: 99%
“…SMS controlled botnets such as [19], [33] send and receive SMS messages for their command and control channel. Since this work focuses on outgoing signaling traffic we decided to only look at outgoing traffic, from the phone to the network.…”
Section: E Sms Controlled Botnetsmentioning
confidence: 99%
“…There have also been several research efforts to design advanced C&C protocols for mobile botnets. Singh et al [12] evaluated the feasibility of using Bluetooth as a medium for botnet C&C. Muliner [8] proposed SMS and SMS-HTTP hybrid C&C protocols to facilitate the communication between compromised smartphones. Taking a different angle, Traynor et al [11] demonstrated the impact of DDoS attacks against the core of cellular networks utilizing compromised mobile phones.…”
Section: Related Workmentioning
confidence: 99%