HEAL DSpace

A plain type of mobile attack: Compromise of user's privacy through a simple implementation method

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Androulidakis, I en
dc.contributor.author Basios, C en
dc.date.accessioned 2014-03-01T02:51:01Z
dc.date.available 2014-03-01T02:51:01Z
dc.date.issued 2007 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/35300
dc.subject DoS en
dc.subject GSM en
dc.subject Mobile security en
dc.subject Monitoring en
dc.subject Ping en
dc.subject Privacy en
dc.subject SMS en
dc.subject.other Cellular telephone systems en
dc.subject.other Communication systems en
dc.subject.other Global system for mobile communications en
dc.subject.other Landforms en
dc.subject.other Middleware en
dc.subject.other Mobile phones en
dc.subject.other Telecommunication en
dc.subject.other Telecommunication equipment en
dc.subject.other Telephone en
dc.subject.other Telephone sets en
dc.subject.other Cell phones en
dc.subject.other Communication system software en
dc.subject.other DoS en
dc.subject.other GSM en
dc.subject.other Implementation methods en
dc.subject.other International conferences en
dc.subject.other Mobile security en
dc.subject.other Mobile users en
dc.subject.other Monitoring en
dc.subject.other Ping en
dc.subject.other Privacy en
dc.subject.other Short messaging services en
dc.subject.other SMS en
dc.subject.other Computer software en
dc.title A plain type of mobile attack: Compromise of user's privacy through a simple implementation method en
heal.type conferenceItem en
heal.identifier.primary 10.1109/COMSWA.2008.4554458 en
heal.identifier.secondary http://dx.doi.org/10.1109/COMSWA.2008.4554458 en
heal.identifier.secondary 4554458 en
heal.publicationDate 2007 en
heal.abstract An easy way to determine the state of a cell phone without the owner's knowledge is presented in this paper. The described method, combined with a form of patterning mobile user's behavior (in terms of evaluating the mobile phone's state in a tactical way) could lead to privacy compromise revealing his whereabouts. The technical part of the paper is based on the Short Messaging Service and the offered service of Receipt Report, manipulated in such a way as not to reveal any information to the targeted user. In addition, this method can provide known plain texts for an attack on A5. en
heal.journalName 3rd IEEE/Create-Net International Conference on Communication System Software and Middleware, COMSWARE en
dc.identifier.doi 10.1109/COMSWA.2008.4554458 en
dc.identifier.spage 465 en
dc.identifier.epage 470 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής