Mobile Phone Security and Forensics

Author(s):  
Iosif I. Androulidakis
Author(s):  
Thangavel M. ◽  
Divyaprabha M. ◽  
Abinaya C.

Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.


2017 ◽  
Vol 16 (2) ◽  
pp. 92-96 ◽  
Author(s):  
Nayeem Islam ◽  
Saumitra Das ◽  
Yin Chen

Author(s):  
Supriya Deshpande ◽  
Shirish Pattalwar ◽  
Poonam Lohiya

A number of android security and privacy vulnerabilities have been exposed in past several years. However, the mobile malware and privacy leakage remain a big threat to mobile phone security and privacy. It has been observed that phone camera would become a traitor in such attacks by capturing photos or videos secretly. Secret photography is not only immoral but also illegal due to invasion of privacy. Phone users themselves could also become victims and if the phone camera is exploited by malicious spy camera app, it may cause serious security and privacy problems. Most of the existing mobile antivirus apps are unable to monitor such camera based attacks. Hence, we demonstrate two camera based attacks through our proposal namely, Remote controlled real time monitoring Attack like Screen unlocking Attack, SMS Attack. We also propose a light weight defense scheme as a countermeasure for the camera attacks that can protect android phones against harmful spy Camera attacks.


Author(s):  
Jujian Chen ◽  
Xiaorui Hu

In this chapter, the current smartphone market in China is investigated and a comprehensive view of the Chinese mobile market is offered to the global audience. The history of the Chinese mobile phone market is introduced, the smartphone market’s benefits and challenges are presented, and the competition in smartphone apps’ market is demonstrated. Besides providing a comprehensive view of the Chinese mobile market, this chapter offers insight to the Chinese government on mobile market regulations and legal enforcement, promotes mobile phone users’ awareness toward mobile application threats, and presents opportunities in the Chinese mobile phone market to the global smartphone manufacturers, mobile application developers, and mobile phone security software vendors.


Author(s):  
Halim M. Khelalfa

First, the author reviews the currently used guidelines and procedures in digital forensic investigations, and then presents their current adaptations to mobile phone forensics, including criteria for the selection of forensics tool for mobile phone. Due to the world popularity of GSM phones, a detailed description of the SIM file system is presented. The forensic strength and weaknesses of the classes of physical and logical forensic tools are discussed .Current approaches to overcome the impediments of both classes are reviewed in terms of usability and forensic soundness. Then, the newest challenge to the digital forensic community, anti-forensics (AF) is raised, including the risks faced by mobile phone forensics investigation. Finally, the author addresses the issue of current research as well as trends on mobile phone forensics.


Sign in / Sign up

Export Citation Format

Share Document