Trojan horses in mobile devices
Computer Science and Information Systems, Tome 7 (2010) no. 4
Cet article a éte moissonné depuis la source Computer Science and Information Systems website
This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a user's contacts information through the previous installation of the Trojan horse. The results show that this process means a loss of information and a quantified cost to the attacked user too. This paper proposes different solutions to avoid this malware and its effects.
Keywords:
Mobile security, Mobile Infections, Trojan horses
@article{CSIS_2010_7_4_a8,
author = {Daniel Fuentes and Juan A. �lvarez and Juan A. Ortega and Luis Gonzalez-Abril and Francisco Velasco},
title = {Trojan horses in mobile devices},
journal = {Computer Science and Information Systems},
year = {2010},
volume = {7},
number = {4},
url = {http://geodesic.mathdoc.fr/item/CSIS_2010_7_4_a8/}
}
TY - JOUR AU - Daniel Fuentes AU - Juan A. �lvarez AU - Juan A. Ortega AU - Luis Gonzalez-Abril AU - Francisco Velasco TI - Trojan horses in mobile devices JO - Computer Science and Information Systems PY - 2010 VL - 7 IS - 4 UR - http://geodesic.mathdoc.fr/item/CSIS_2010_7_4_a8/ ID - CSIS_2010_7_4_a8 ER -
Daniel Fuentes; Juan A. �lvarez; Juan A. Ortega; Luis Gonzalez-Abril; Francisco Velasco. Trojan horses in mobile devices. Computer Science and Information Systems, Tome 7 (2010) no. 4. http://geodesic.mathdoc.fr/item/CSIS_2010_7_4_a8/