Publikace UTB
Repozitář publikační činnosti UTB

Mobile cyberwarfare threats and mitigations: An overview

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Mobile cyberwarfare threats and mitigations: An overview en
dc.contributor.author Sarga, Libor
dc.contributor.author Jašek, Roman
dc.relation.ispartof European Conference on Information Warfare and Security, ECCWS
dc.identifier.issn 2048-8602 Scopus Sources, Sherpa/RoMEO, JCR
dc.identifier.isbn 9781627489089
dc.date.issued 2013
dc.citation.spage 243
dc.citation.epage 251
dc.event.title 12th European Conference on Information Warfare and Security 2013, ECIW 2013
dc.event.location Jyvaskyla
utb.event.state-en Finland
utb.event.state-cs Finsko
dc.event.sdate 2013-07-11
dc.event.edate 2013-07-12
dc.type conferenceObject
dc.language.iso en
dc.relation.uri https://www.proquest.com/docview/1400694891/abstract/69AB6AEB1B104CB4PQ/1
dc.relation.uri https://www.proquest.com/docview/1400694891/fulltextPDF/50338998A6284DE4PQ/1
dc.subject mobile en
dc.subject cyberwarfare en
dc.subject exploit en
dc.subject malware en
dc.subject security en
dc.description.abstract Mobile technologies have transformed rapidly with their rate of adoption increasing for several years. Smartphones, tablets, and other small form-factor devices are integrated in educational institutions, medical and commercial facilities with further military, governmental as well as industrial deployment expected in future. However, the complexity from interconnected hardware and software layers opens up multiple attack vectors for adversaries, allowing personally identifiable data exfiltration, malicious modifications of the device's intended functionality, pushing unauthorized code without user consent, or incorporating it into a botnet. Mobile threat landscape has become the next stage of cyberwarfare. Here, users unable or unwilling to adequately protect themselves make decisions based on information originating from untrusted third parties with potentially harmful intents. Recognizing the situation, a comprehensive array of tools and concepts such as ASLR, DEP, closing the source code, sandboxing, and code validation has been implemented. In this asymmetric security model, developers invalidate novel attack vectors while adversaries employ sophisticated techniques to thwart detection for large-scale penetration. The former are further penalized by heterogeneous base of software versions, some entirely defenseless against recent exploits. The paper presents an overview of techniques in current mobile operating systems and best practices the vendors incorporated to minimize unauthorized third-party modifications. It also aims to provide high-level description of exploits malware creators use to target users who, as we further postulate, underestimate capabilities of their devices. Best practices for safer use are briefly outlined, too. en
utb.faculty Faculty of Management and Economics
dc.identifier.uri http://hdl.handle.net/10563/1004649
utb.identifier.obdid 43870185
utb.identifier.scopus 2-s2.0-84893482782
utb.source d-scopus
dc.date.accessioned 2015-06-04T12:54:41Z
dc.date.available 2015-06-04T12:54:41Z
utb.contributor.internalauthor Sarga, Libor
utb.contributor.internalauthor Jašek, Roman
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam