Kontaktujte nás | Jazyk: čeština English
dc.title | Mobile cyberwarfare threats and mitigations: An overview | en |
dc.contributor.author | Sarga, Libor | |
dc.contributor.author | Jašek, Roman | |
dc.relation.ispartof | European Conference on Information Warfare and Security, ECCWS | |
dc.identifier.issn | 2048-8602 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.identifier.isbn | 9781627489089 | |
dc.date.issued | 2013 | |
dc.citation.spage | 243 | |
dc.citation.epage | 251 | |
dc.event.title | 12th European Conference on Information Warfare and Security 2013, ECIW 2013 | |
dc.event.location | Jyvaskyla | |
utb.event.state-en | Finland | |
utb.event.state-cs | Finsko | |
dc.event.sdate | 2013-07-11 | |
dc.event.edate | 2013-07-12 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.relation.uri | https://www.proquest.com/docview/1400694891/abstract/69AB6AEB1B104CB4PQ/1 | |
dc.relation.uri | https://www.proquest.com/docview/1400694891/fulltextPDF/50338998A6284DE4PQ/1 | |
dc.subject | mobile | en |
dc.subject | cyberwarfare | en |
dc.subject | exploit | en |
dc.subject | malware | en |
dc.subject | security | en |
dc.description.abstract | Mobile technologies have transformed rapidly with their rate of adoption increasing for several years. Smartphones, tablets, and other small form-factor devices are integrated in educational institutions, medical and commercial facilities with further military, governmental as well as industrial deployment expected in future. However, the complexity from interconnected hardware and software layers opens up multiple attack vectors for adversaries, allowing personally identifiable data exfiltration, malicious modifications of the device's intended functionality, pushing unauthorized code without user consent, or incorporating it into a botnet. Mobile threat landscape has become the next stage of cyberwarfare. Here, users unable or unwilling to adequately protect themselves make decisions based on information originating from untrusted third parties with potentially harmful intents. Recognizing the situation, a comprehensive array of tools and concepts such as ASLR, DEP, closing the source code, sandboxing, and code validation has been implemented. In this asymmetric security model, developers invalidate novel attack vectors while adversaries employ sophisticated techniques to thwart detection for large-scale penetration. The former are further penalized by heterogeneous base of software versions, some entirely defenseless against recent exploits. The paper presents an overview of techniques in current mobile operating systems and best practices the vendors incorporated to minimize unauthorized third-party modifications. It also aims to provide high-level description of exploits malware creators use to target users who, as we further postulate, underestimate capabilities of their devices. Best practices for safer use are briefly outlined, too. | en |
utb.faculty | Faculty of Management and Economics | |
dc.identifier.uri | http://hdl.handle.net/10563/1004649 | |
utb.identifier.obdid | 43870185 | |
utb.identifier.scopus | 2-s2.0-84893482782 | |
utb.source | d-scopus | |
dc.date.accessioned | 2015-06-04T12:54:41Z | |
dc.date.available | 2015-06-04T12:54:41Z | |
utb.contributor.internalauthor | Sarga, Libor | |
utb.contributor.internalauthor | Jašek, Roman |