Trojan horses in mobile devices
Computer Science and Information Systems, Tome 7 (2010) no. 4.

Voir la notice de l'article provenant de la source Computer Science and Information Systems website

This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a user's contacts information through the previous installation of the Trojan horse. The results show that this process means a loss of information and a quantified cost to the attacked user too. This paper proposes different solutions to avoid this malware and its effects.
Keywords: Mobile security, Mobile Infections, Trojan horses
@article{CSIS_2010_7_4_a8,
     author = {Daniel Fuentes and Juan A. �lvarez and Juan A. Ortega and Luis Gonzalez-Abril and Francisco Velasco},
     title = {Trojan horses in mobile devices},
     journal = {Computer Science and Information Systems},
     publisher = {mathdoc},
     volume = {7},
     number = {4},
     year = {2010},
     url = {http://geodesic.mathdoc.fr/item/CSIS_2010_7_4_a8/}
}
TY  - JOUR
AU  - Daniel Fuentes
AU  - Juan A. �lvarez
AU  - Juan A. Ortega
AU  - Luis Gonzalez-Abril
AU  - Francisco Velasco
TI  - Trojan horses in mobile devices
JO  - Computer Science and Information Systems
PY  - 2010
VL  - 7
IS  - 4
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/CSIS_2010_7_4_a8/
ID  - CSIS_2010_7_4_a8
ER  - 
%0 Journal Article
%A Daniel Fuentes
%A Juan A. �lvarez
%A Juan A. Ortega
%A Luis Gonzalez-Abril
%A Francisco Velasco
%T Trojan horses in mobile devices
%J Computer Science and Information Systems
%D 2010
%V 7
%N 4
%I mathdoc
%U http://geodesic.mathdoc.fr/item/CSIS_2010_7_4_a8/
%F CSIS_2010_7_4_a8
Daniel Fuentes; Juan A. �lvarez; Juan A. Ortega; Luis Gonzalez-Abril; Francisco Velasco. Trojan horses in mobile devices. Computer Science and Information Systems, Tome 7 (2010) no. 4. http://geodesic.mathdoc.fr/item/CSIS_2010_7_4_a8/