Title of article :
Trojan horses in mobile devices
Author/Authors :
Daniel Fuentes، نويسنده , , Juan A. Alvarez، نويسنده , , Juan A. Ortega، نويسنده , , Luis Gonzalez-Abril، نويسنده , , Francisco Velasco ، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2010
Pages :
10
From page :
813
To page :
822
Abstract :
This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a userʹs contacts information through the previous installation of the Trojan horse. The results show that this process means a loss of information and a quantified cost to the attacked user too. This paper proposes different solutions to avoid this malware and its effects.
Keywords :
Mobile security , Mobile Infections , Trojan horses
Journal title :
Computer Science and Information Systems
Serial Year :
2010
Journal title :
Computer Science and Information Systems
Record number :
679288
Link To Document :
بازگشت