Abstract
With the increase in popularity of mobile devices for personal and business reasons, they have become even more attractive targets to malicious actors. There are many vulnerabilities with any mobile device, though some environments, features, and operating systems are at higher risk than others for certain attacks. This paper discusses such vulnerabilities, including the elements that allow them, methods of exploiting them, and one might combat attacks on mobile devices.
References (31)
- Ahsan, M., Gomes, R., Chowdhury, M. M., & Nygard, K. E. (2021). Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector. Journal of Cybersecurity and Privacy, 1(1), 199-218.
- Chebyshev, V. (2019). Mobile Malware Evolution: 2018 -Securelist. Securelist, 1-20. https://securelist.com/mobile-malware-evolution-2018/89689/.
- Chowdhury, M. M., & Nygard, K. E. (2017). Deception in cyberspace: An empirical study on a con man attack. IEEE International Conference on Electro Information Technology, 410-415. Chowdhury, M. M., Nygard, K. E., Kambhampaty, K., & Alruwaythi, M. (2018). Deception in Cyberspace: Performance Focused Con Resistant Trust Algorithm. Proceedings -2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017, 25-30. Chowdhury, M., & Nygard, K. E. (2018). Machine learning within a con resistant trust model. Proceedings of the 33rd International Conference on Computers and Their Applications, CATA 2018, 2018-March.
- Enck, W., Gilbert, P., Chun, B. G., Cox, L. P., Jung, J., McDaniel, P., & Sheth, A. N. (2019). TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2010, 393-407.
- Felt, A., Greenwood, K., & Wagner, D. (2011). The effectiveness of application permissions.
- WebApps '11: 2nd USENIX Conference on Web Application Development, 75-86.
- Felt, A. P., Finifter, M., Chin, E., Hanna, S., & Wagner, D. (2011). A survey of mobile malware in the wild. Proceedings of the ACM Conference on Computer and Communications Security, 3-14. 'Ghost Push' Malware Threatens Android Users. (n.d.). Retrieved February 15, 2022, from https://www.pandasecurity.com/en/mediacenter/mobile-security/ghost-push-malware-android/ Hassold, C. (2017). The Mobile Phishing Threat You'll See Very Soon : URL Padding. PhishLabs. https://www.phishlabs.com/blog/the-mobile-phishing-threat-youll-see-very-soon-url- padding/ Kaspersky Lab. (2019). The number of mobile malware attacks doubles in 2018, as cybercriminals sharpen their distribution strategies. https://www.kaspersky.com/about/press- releases/2019_the-number-of-mobile-malware-attacks-doubles-in-2018-as-cybercriminals-sharpen- their-distribution-strategies Krishna Kambhampaty, Maryam Alruwaythi, Md Minhaz Chowdhury, K. N. (2019). Trust and its Influence on Technology. The Midwest Instruction and Computing Sym-Posium 2019. Li, R., Shen, C., He, H., Gu, X., Xu, Z., & Xu, C. Z. (2018). A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing. IEEE Transactions on Cloud Computing, 6(2), 344-357. Md Minhaz Chowdhury, K. E. N. (2017). An Empirical Study on Con Resistant Trust Algorithm for Cyberspace. The 2017 World Congress in Computer Sci-Ence, Computer Engineering, & Applied Computing Mobile botnets taking over smartphones -BullGuard. (n.d.). Retrieved February 15, 2022, from https://www.bullguard.com/bullguard-security-center/mobile-security/mobile-threats/mobile- botnets.aspx Samangouei, P., Patel, V. M., & Chellappa, R. (2015, December 16). Attribute-based continuous user authentication on mobile devices. 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, BTAS 2015.
- Samani, R., & Davis, G. (2019). McAfee Mobile Threat Report Mobile Malware Continues to Increase in Complexity and Scope. McAfee.
- Seacord, R. C. (2015). Mobile device security. MobileDeLi 2015 -Proceedings of the 3rd International Workshop on Mobile Development Lifecycle, 1-2.
- Technologies, P. (2019). Mobile Application Security Threats and Vulnerabilities 2019: Mobile Device Security -Attacks Research. https://www.ptsecurity.com/ww-en/analytics/mobile-application- security-threats-and-vulnerabilities-2019/.
- Teh, P. S., Zhang, N., Tan, S. Y., Shi, Q., Khoh, W. H., & Nawaz, R. (2020). Strengthen user authentication on mobile devices by using user's touch dynamics pattern. Journal of Ambient Intelligence and Humanized Computing, 11(10), 4019-4039.
- Watkins, L., Kalathummarath, A. L., & Robinson, W. H. (2018). Network-based detection of mobile malware exhibiting obfuscated or silent network behavior. CCNC 2018 -2018 15th IEEE Annual Consumer Communications and Networking Conference, 2018-Janua, 1-4.
- Wu, L., Wang, J., Choo, K. K. R., & He, D. (2018). Secure Key Agreement and Key Protection for Mobile Device User Authentication. IEEE Transactions on Information Forensics and Security, 14(2), 319-330.
- Zhu, H., Xiong, H., Ge, Y., & Chen, E. (2014). Mobile app recommendations with security and privacy awareness. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 951-960.
- Ahsan, M., Gomes, R., Chowdhury, M. M., & Nygard, K. E. (2021). Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector. Journal of Cybersecurity and Privacy, 1(1), 199-218.
- Chebyshev, V. (2019). Mobile Malware Evolution: 2018 -Securelist. Securelist, 1-20. https://securelist.com/mobile-malware-evolution-2018/89689/.
- Chowdhury, M. M., & Nygard, K. E. (2017). Deception in cyberspace: An empirical study on a con man attack. IEEE International Conference on Electro Information Technology, 410-415. Chowdhury, M. M., Nygard, K. E., Kambhampaty, K., & Alruwaythi, M. (2018). Deception in Cyberspace: Performance Focused Con Resistant Trust Algorithm. Proceedings -2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017, 25-30. Chowdhury, M., & Nygard, K. E. (2018). Machine learning within a con resistant trust model. Proceedings of the 33rd International Conference on Computers and Their Applications, CATA 2018, 2018-March.
- Enck, W., Gilbert, P., Chun, B. G., Cox, L. P., Jung, J., McDaniel, P., & Sheth, A. N. (2019). TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2010, 393-407.
- Felt, A., Greenwood, K., & Wagner, D. (2011). The effectiveness of application permissions.
- WebApps '11: 2nd USENIX Conference on Web Application Development, 75-86.
- Felt, A. P., Finifter, M., Chin, E., Hanna, S., & Wagner, D. (2011). A survey of mobile malware in the wild. Proceedings of the ACM Conference on Computer and Communications Security, 3-14. 'Ghost Push' Malware Threatens Android Users. (n.d.). Retrieved February 15, 2022, from https://www.pandasecurity.com/en/mediacenter/mobile-security/ghost-push-malware-android/.
- Hassold, C. (2017). The Mobile Phishing Threat You'll See Very Soon : URL Padding. PhishLabs. https://www.phishlabs.com/blog/the-mobile-phishing-threat-youll-see-very-soon-url- padding/.
- Kaspersky Lab. (2019). The number of mobile malware attacks doubles in 2018, as cybercriminals sharpen their distribution strategies. https://www.kaspersky.com/about/press- releases/2019_the-number-of-mobile-malware-attacks-doubles-in-2018-as-cybercriminals-sharpen- their-distribution-strategies.
- Krishna Kambhampaty, Maryam Alruwaythi, Md Minhaz Chowdhury, K. N. (2019). Trust and its Influence on Technology. The Midwest Instruction and Computing Sym-Posium 2019. Li, R., Shen, C., He, H., Gu, X., Xu, Z., & Xu, C. Z. (2018). A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing. IEEE Transactions on Cloud Computing, 6(2), 344-357. Mobile botnets taking over smartphones -BullGuard. (n.d.). Retrieved February 15, 2022, from https://www.bullguard.com/bullguard-security-center/mobile-security/mobile-threats/mobile- botnets.aspx. Samangouei, P., Patel, V. M., & Chellappa, R. (2015, December 16). Attribute-based continuous user authentication on mobile devices. 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, BTAS 2015.
- Samani, R., & Davis, G. (2019). McAfee Mobile Threat Report Mobile Malware Continues to Increase in Complexity and Scope. McAfee.
- Seacord, R. C. (2015). Mobile device security. MobileDeLi 2015 -Proceedings of the 3rd International Workshop on Mobile Development Lifecycle, 1-2.
- Technologies, P. (2019). Mobile Application Security Threats and Vulnerabilities 2019: Mobile Device Security -Attacks Research. https://www.ptsecurity.com/ww-en/analytics/mobile-application- security-threats-and-vulnerabilities-2019/
- Teh, P. S., Zhang, N., Tan, S. Y., Shi, Q., Khoh, W. H., & Nawaz, R. (2020). Strengthen user authentication on mobile devices by using user's touch dynamics pattern. Journal of Ambient Intelligence and Humanized Computing, 11(10), 4019-4039.
- Watkins, L., Kalathummarath, A. L., & Robinson, W. H. (2018). Network-based detection of mobile malware exhibiting obfuscated or silent network behavior. CCNC 2018 -2018 15th IEEE Annual Consumer Communications and Networking Conference, 2018-Janua, 1-4.
- Wu, L., Wang, J., Choo, K. K. R., & He, D. (2018). Secure Key Agreement and Key Protection for Mobile Device User Authentication. IEEE Transactions on Information Forensics and Security, 14(2), 319-330.
- Zhu, H., Xiong, H., Ge, Y., & Chen, E. (2014). Mobile app recommendations with security and privacy awareness. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 951-960.