2019
DOI: 10.15199/48.2019.08.29
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis for authentication and authorisation in mobile phone

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…It possesses a new capability to prompt a fake alert dialogue to phish user credentials, hijack opening specifics URLs, and read and write data in the user clipboard. Work by [12] found AceDeciever that infects any Apple device connected to infected PC (personal computer) were capable of obtaining Apple ID (identification) and password. Finally, work by [13] found Keyraider worm, where it intercepted iTunes traffic and stole user login credentials, GUID (Globally Unique Identifier) devices Apple requests push service certificates and private keys, and iTunes receipts for purchase.…”
Section: A Ios Malware Attacksmentioning
confidence: 99%
“…It possesses a new capability to prompt a fake alert dialogue to phish user credentials, hijack opening specifics URLs, and read and write data in the user clipboard. Work by [12] found AceDeciever that infects any Apple device connected to infected PC (personal computer) were capable of obtaining Apple ID (identification) and password. Finally, work by [13] found Keyraider worm, where it intercepted iTunes traffic and stole user login credentials, GUID (Globally Unique Identifier) devices Apple requests push service certificates and private keys, and iTunes receipts for purchase.…”
Section: A Ios Malware Attacksmentioning
confidence: 99%