dc.contributor.author |
Androulidakis, I |
en |
dc.contributor.author |
Basios, C |
en |
dc.date.accessioned |
2014-03-01T02:51:01Z |
|
dc.date.available |
2014-03-01T02:51:01Z |
|
dc.date.issued |
2007 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/35300 |
|
dc.subject |
DoS |
en |
dc.subject |
GSM |
en |
dc.subject |
Mobile security |
en |
dc.subject |
Monitoring |
en |
dc.subject |
Ping |
en |
dc.subject |
Privacy |
en |
dc.subject |
SMS |
en |
dc.subject.other |
Cellular telephone systems |
en |
dc.subject.other |
Communication systems |
en |
dc.subject.other |
Global system for mobile communications |
en |
dc.subject.other |
Landforms |
en |
dc.subject.other |
Middleware |
en |
dc.subject.other |
Mobile phones |
en |
dc.subject.other |
Telecommunication |
en |
dc.subject.other |
Telecommunication equipment |
en |
dc.subject.other |
Telephone |
en |
dc.subject.other |
Telephone sets |
en |
dc.subject.other |
Cell phones |
en |
dc.subject.other |
Communication system software |
en |
dc.subject.other |
DoS |
en |
dc.subject.other |
GSM |
en |
dc.subject.other |
Implementation methods |
en |
dc.subject.other |
International conferences |
en |
dc.subject.other |
Mobile security |
en |
dc.subject.other |
Mobile users |
en |
dc.subject.other |
Monitoring |
en |
dc.subject.other |
Ping |
en |
dc.subject.other |
Privacy |
en |
dc.subject.other |
Short messaging services |
en |
dc.subject.other |
SMS |
en |
dc.subject.other |
Computer software |
en |
dc.title |
A plain type of mobile attack: Compromise of user's privacy through a simple implementation method |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/COMSWA.2008.4554458 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/COMSWA.2008.4554458 |
en |
heal.identifier.secondary |
4554458 |
en |
heal.publicationDate |
2007 |
en |
heal.abstract |
An easy way to determine the state of a cell phone without the owner's knowledge is presented in this paper. The described method, combined with a form of patterning mobile user's behavior (in terms of evaluating the mobile phone's state in a tactical way) could lead to privacy compromise revealing his whereabouts. The technical part of the paper is based on the Short Messaging Service and the offered service of Receipt Report, manipulated in such a way as not to reveal any information to the targeted user. In addition, this method can provide known plain texts for an attack on A5. |
en |
heal.journalName |
3rd IEEE/Create-Net International Conference on Communication System Software and Middleware, COMSWARE |
en |
dc.identifier.doi |
10.1109/COMSWA.2008.4554458 |
en |
dc.identifier.spage |
465 |
en |
dc.identifier.epage |
470 |
en |