Trojan horses in mobile devices
Computer Science and Information Systems, Tome 7 (2010) no. 4
This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a user's contacts information through the previous installation of the Trojan horse. The results show that this process means a loss of information and a quantified cost to the attacked user too. This paper proposes different solutions to avoid this malware and its effects.
Keywords:
Mobile security, Mobile Infections, Trojan horses
@article{CSIS_2010_7_4_a8,
author = {Daniel Fuentes and Juan A. �lvarez and Juan A. Ortega and Luis Gonzalez-Abril and Francisco Velasco},
title = {Trojan horses in mobile devices},
journal = {Computer Science and Information Systems},
year = {2010},
volume = {7},
number = {4},
url = {http://geodesic.mathdoc.fr/item/CSIS_2010_7_4_a8/}
}
TY - JOUR AU - Daniel Fuentes AU - Juan A. �lvarez AU - Juan A. Ortega AU - Luis Gonzalez-Abril AU - Francisco Velasco TI - Trojan horses in mobile devices JO - Computer Science and Information Systems PY - 2010 VL - 7 IS - 4 UR - http://geodesic.mathdoc.fr/item/CSIS_2010_7_4_a8/ ID - CSIS_2010_7_4_a8 ER -
Daniel Fuentes; Juan A. �lvarez; Juan A. Ortega; Luis Gonzalez-Abril; Francisco Velasco. Trojan horses in mobile devices. Computer Science and Information Systems, Tome 7 (2010) no. 4. http://geodesic.mathdoc.fr/item/CSIS_2010_7_4_a8/