Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices 2016
DOI: 10.1145/2994459.2994465
|View full text |Cite
|
Sign up to set email alerts
|

White Rabbit in Mobile

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…It is possible to detect the presence of these rogue base stations, although some may consider this technology still in developmental stages. Mobile applications can be used to detect the presence of rogue base stations, although using specific chipsets on older device models are often required [35]. Different approaches can be used for detection purposes.…”
Section: Rogue Base Station Detectionmentioning
confidence: 99%
“…It is possible to detect the presence of these rogue base stations, although some may consider this technology still in developmental stages. Mobile applications can be used to detect the presence of rogue base stations, although using specific chipsets on older device models are often required [35]. Different approaches can be used for detection purposes.…”
Section: Rogue Base Station Detectionmentioning
confidence: 99%
“…Other activities potentially leading to mobile phone exploitation include the use of smartwatches and wearable accessories, which expose mobile devices to vulnerabilities [101,112]. Furthermore, people frequently hold mobile phone devices with essential data assets [107].…”
Section: Smartphone User Activities Based On Physical Modalitymentioning
confidence: 99%
“…Several techniques to corrupt the date and time of a smartphone have been identified (see Park et al [23] for detailed information). In this section, we describe four of them.…”
Section: Time-traveling Phonesmentioning
confidence: 99%
“…Most likely, 2G will phase out from smartphones way later than the virus. If not, rogue 3G/4G base stations can be made too, but it would require to bypass authentication (at least, on phones which use it [23]).…”
Section: Fig 6 Pictures Of Immuni Raising An Alertmentioning
confidence: 99%