IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012) 2012
DOI: 10.1109/dsn.2012.6263943
|View full text |Cite
|
Sign up to set email alerts
|

Taming Mr Hayes: Mitigating signaling based attacks on smartphones

Abstract: Abstract-Malicious injection of cellular signaling traffic from mobile phones is an emerging security issue. The respective attacks can be performed by hijacked smartphones and by malware resident on mobile phones. Until today there are no protection mechanisms in place to prevent signaling based attacks other than implementing expensive additions to the cellular core network. In this work we present a protection system that resides on the mobile phone. Our solution works by partitioning the phone software sta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 22 publications
0
11
0
Order By: Relevance
“…Mulliner et al [15] introduce a software architecture for smartphones that can mitigate threats against the cellular network even in the event of a full compromise of the smartphone operating system. Client-side solutions that require custom firmwares are unlikely to find much adoption because of costs for certification needed for admission to cellular networks, which have to be done again for every new type of device.…”
Section: Related Work and Backgroundmentioning
confidence: 99%
“…Mulliner et al [15] introduce a software architecture for smartphones that can mitigate threats against the cellular network even in the event of a full compromise of the smartphone operating system. Client-side solutions that require custom firmwares are unlikely to find much adoption because of costs for certification needed for admission to cellular networks, which have to be done again for every new type of device.…”
Section: Related Work and Backgroundmentioning
confidence: 99%
“…In order to understand this attack vector, we need to comprehend how a modern smartphone works. A modern smartphone is built with two OSs, running in two very different environments [4]. On one hand we have the AP, Application Processor, where the android OS and all the applications with which the user interacts run.…”
Section: At Commandsmentioning
confidence: 99%
“…In wireline networks, malicious botnets are used to generate various forms of spam, phishing, and distributed denial-of-service (DDoS) attacks. Mobile botnets extend such capability to cellular networks, give cybercriminals the advantages of control and adaptability, and pose a significant threat to the mobile core network as they could be used to launch debilitating signaling-based DDoS attacks [25]- [28].…”
Section: A Mobile Malwarementioning
confidence: 99%