Skip to main content
Top
Published in:
Cover of the book

2016 | OriginalPaper | Chapter

1. Introduction: Confidentiality, Integrity, and Availability Threats in Mobile Phones

Author : Iosif I. Androulidakis

Published in: Mobile Phone Security and Forensics

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this introductory chapter, we will briefly describe and group as many as possible of the threats in Confidentiality, Integrity, and Availability that mobile phones are facing. As such, it will be the basis for the discussions that will follow in the next chapters.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Suominen M. GSM Security. Helsinki University of Technology Suominen M. GSM Security. Helsinki University of Technology
2.
go back to reference Steve Lord, Modern GSM Insecurities, 2003 . GSM-Security.net Steve Lord, Modern GSM Insecurities, 2003 . GSM-Security.net
3.
go back to reference Huynh T, Nguyen H. Overview of GSM and GSM Security, Department of Electrical Engineering and Computer Science Oregon State University Huynh T, Nguyen H. Overview of GSM and GSM Security, Department of Electrical Engineering and Computer Science Oregon State University
4.
go back to reference Quirke J (2004) Security in the GSM system., AusMobile Quirke J (2004) Security in the GSM system., AusMobile
5.
6.
go back to reference Gadaix E (2006) NGN Security. Bellua Cyber Security 2006 Gadaix E (2006) NGN Security. Bellua Cyber Security 2006
7.
go back to reference Gadaix E (2003) GSM operators security, xcon Gadaix E (2003) GSM operators security, xcon
8.
go back to reference Preneel B. Mobile network security. Katholieke Universiteit Leuven Preneel B. Mobile network security. Katholieke Universiteit Leuven
9.
go back to reference Lord S (2003) Trouble at the Telco: when GSM goes bad. Network Security 1:10–12CrossRef Lord S (2003) Trouble at the Telco: when GSM goes bad. Network Security 1:10–12CrossRef
10.
go back to reference Yousef P. GSM-Security: a Survey and Evaluation of the Current Situation. ISY, Linköping Institute of Technology Yousef P. GSM-Security: a Survey and Evaluation of the Current Situation. ISY, Linköping Institute of Technology
11.
go back to reference Androulidakis I (2009) Security in GSM and in mobile phones. IT Security Professional Magazine 9:35–41 Androulidakis I (2009) Security in GSM and in mobile phones. IT Security Professional Magazine 9:35–41
12.
go back to reference Androulidakis I (2006) This is how hackers hack into our cell phones. Sunday Newspaper “To proto thema”. 90:40–41 Androulidakis I (2006) This is how hackers hack into our cell phones. Sunday Newspaper “To proto thema”. 90:40–41
13.
go back to reference Androulidakis I (2006) Security issues in cell phones. Defence and Diplomacy Magazine 187:100–102 Androulidakis I (2006) Security issues in cell phones. Defence and Diplomacy Magazine 187:100–102
14.
go back to reference Karsten N, Krißler S (2009) Subverting the security base of GSM, HAR2009 Karsten N, Krißler S (2009) Subverting the security base of GSM, HAR2009
15.
go back to reference Karsten Nohl and Chris Paget, GSM—srsly? 26C3, Berlin 2009 Karsten Nohl and Chris Paget, GSM—srsly? 26C3, Berlin 2009
16.
go back to reference Pesonen L (1999) GSM interception. Department of Computer Science and Engineering Helsinki, University of Technology Pesonen L (1999) GSM interception. Department of Computer Science and Engineering Helsinki, University of Technology
17.
go back to reference Shoghi Communications Limited. Interception and monitoring of SMS & Voice communications on GSM 850/900/1800/1900 MHz Networks Shoghi Communications Limited. Interception and monitoring of SMS & Voice communications on GSM 850/900/1800/1900 MHz Networks
18.
go back to reference Cryptome.org. Interception of GSM Cellphones, 2005 Cryptome.org. Interception of GSM Cellphones, 2005
19.
go back to reference Patel S (2004) Eavesdropping without breaking the GSM encryption algorithm. 3GPP TSG SA WG3 Security—SA3#33, 10-14 May, Beijing Patel S (2004) Eavesdropping without breaking the GSM encryption algorithm. 3GPP TSG SA WG3 Security—SA3#33, 10-14 May, Beijing
20.
go back to reference Manuel J (2002) Fernandez-Iglesias on the application of formal description techniques to the design of interception systems for GSM mobile terminals. J Syst Softw 60:51–58CrossRef Manuel J (2002) Fernandez-Iglesias on the application of formal description techniques to the design of interception systems for GSM mobile terminals. J Syst Softw 60:51–58CrossRef
21.
go back to reference Androulidakis I (2009) Intercepting mobile phones. IT Security Professional Magazine 8:42–48 Androulidakis I (2009) Intercepting mobile phones. IT Security Professional Magazine 8:42–48
22.
go back to reference Androulidakis I (2011) Intercepting mobile phone calls and short messages using a GSM tester, vol 160, Springer communications in computer and information science. Springer, Berlin, pp 281–288 Androulidakis I (2011) Intercepting mobile phone calls and short messages using a GSM tester, vol 160, Springer communications in computer and information science. Springer, Berlin, pp 281–288
23.
go back to reference Rieger F (2005) New interception threats from non-state actors and software-based voice encryption. IEE Secure Mobile Communications Rieger F (2005) New interception threats from non-state actors and software-based voice encryption. IEE Secure Mobile Communications
31.
go back to reference Hulton D, Mueller S (2008) Intercepting Mobile Phone/GSM Traffic. BlackHat Europe 2008 Hulton D, Mueller S (2008) Intercepting Mobile Phone/GSM Traffic. BlackHat Europe 2008
35.
go back to reference Biryukov A, Shamir A, Wagner D (2000) Real time cryptanalysis of A5/1 on a PC. In: Proceedings of fast software encryption, New York, Lecture Notes in Computer Science. Springer, Berlin Biryukov A, Shamir A, Wagner D (2000) Real time cryptanalysis of A5/1 on a PC. In: Proceedings of fast software encryption, New York, Lecture Notes in Computer Science. Springer, Berlin
36.
go back to reference Barkan E, Biham E, Keller N (2003) Instant Ciphertext-Only cryptanalysis of GSM encrypted communications. In: Boneh D (ed) CRYPTO 2003, vol 2729, LNCS. Springer, Heidelberg Barkan E, Biham E, Keller N (2003) Instant Ciphertext-Only cryptanalysis of GSM encrypted communications. In: Boneh D (ed) CRYPTO 2003, vol 2729, LNCS. Springer, Heidelberg
40.
go back to reference Prevelakis V (2007) The Athens affair. IEEE Spectrum, July Prevelakis V (2007) The Athens affair. IEEE Spectrum, July
41.
go back to reference Laitinen H, Lahteenmaki J, Nordstrom T (2001) Cellular location technology, 2001. Conference: Vehicular Technology Conference Laitinen H, Lahteenmaki J, Nordstrom T (2001) Cellular location technology, 2001. Conference: Vehicular Technology Conference
42.
43.
go back to reference Engel T (2008) Locating mobile phones using signaling system #7, 25th Chaos Communication Congress Engel T (2008) Locating mobile phones using signaling system #7, 25th Chaos Communication Congress
44.
go back to reference Androulidakis I (2011) Locating a GSM phone in a given area without user consent. Presentation in hack.lu 2011 conference, Luxembourg, 19 Sept 2011 Androulidakis I (2011) Locating a GSM phone in a given area without user consent. Presentation in hack.lu 2011 conference, Luxembourg, 19 Sept 2011
45.
go back to reference Welte H (2009) Report of OpenBSC GSM field test, HAR2009 Welte H (2009) Report of OpenBSC GSM field test, HAR2009
46.
go back to reference Hynninen J (2000) Experiences in mobile phone fraud. HUT TML Hynninen J (2000) Experiences in mobile phone fraud. HUT TML
47.
go back to reference Müller M (1999) Intruder scenarios in telecom networks Müller M (1999) Intruder scenarios in telecom networks
48.
go back to reference Shawe-Taylor J, Howker K (1999) Detection of fraud in mobile telecommunications. Information Security Technical Report 4(1) Shawe-Taylor J, Howker K (1999) Detection of fraud in mobile telecommunications. Information Security Technical Report 4(1)
49.
go back to reference Androulidakis I (2011) Combating telecommunications cybercrime, 3 hour course, high-tech crime department of the national bureau of investigation of Hungary, Budapest, 19 April 2011 Androulidakis I (2011) Combating telecommunications cybercrime, 3 hour course, high-tech crime department of the national bureau of investigation of Hungary, Budapest, 19 April 2011
50.
go back to reference Androulidakis I. Detecting cybercrime in modern telecommunication systems. In: European Police College (CEPOL), Seminar 64/2010, Cyber Crime & High Tech, Athens, 18–21/5/2010 Androulidakis I. Detecting cybercrime in modern telecommunication systems. In: European Police College (CEPOL), Seminar 64/2010, Cyber Crime & High Tech, Athens, 18–21/5/2010
51.
go back to reference Androulidakis I. Cybercrime in mobile telephony systems, European Police College (CEPOL), Seminar 62/2011, High Tech & Cyber Crime, Brdo near Kranj, Slovenia, 20 Oct 2011 Androulidakis I. Cybercrime in mobile telephony systems, European Police College (CEPOL), Seminar 62/2011, High Tech & Cyber Crime, Brdo near Kranj, Slovenia, 20 Oct 2011
52.
go back to reference Cadonau J (2008) OTA and secure SIM lifecycle management smart cards, tokens, security and applications Cadonau J (2008) OTA and secure SIM lifecycle management smart cards, tokens, security and applications
53.
go back to reference Bocan V, Cretu V (2006) Mitigating denial of service threats in GSM networks, ARES Bocan V, Cretu V (2006) Mitigating denial of service threats in GSM networks, ARES
54.
go back to reference Bocan V, Cretu V (2004) Security and denial of service threats in GSM networks. Trans Automatic Control Comput Sci 49(63) Bocan V, Cretu V (2004) Security and denial of service threats in GSM networks. Trans Automatic Control Comput Sci 49(63)
56.
go back to reference Mulliner C, Golde N, Seifert J-P (2011) SMS of death: from analyzing to attacking mobile phones on a large scale, 20th USENIX Security Symposium Mulliner C, Golde N, Seifert J-P (2011) SMS of death: from analyzing to attacking mobile phones on a large scale, 20th USENIX Security Symposium
59.
go back to reference Androulidakis I, Vlachos V, Chatzimisios P (2015) A methodology for testing battery deprivation denial of service attacks in mobile phones. In: International Conference on Information and Digital Technologies (IDT), 7-9 July 2015, pp 6–10. doi:10.1109/DT.2015.7222942 Androulidakis I, Vlachos V, Chatzimisios P (2015) A methodology for testing battery deprivation denial of service attacks in mobile phones. In: International Conference on Information and Digital Technologies (IDT), 7-9 July 2015, pp 6–10. doi:10.​1109/​DT.​2015.​7222942
60.
go back to reference 3GPP, 3rd Generation Partnership Project, Technical Specification Group Core Network and Terminals, Technical realization of the Short Message Service (SMS), 3GPP TS 23.040, 2010. 3GPP, 3rd Generation Partnership Project, Technical Specification Group Core Network and Terminals, Technical realization of the Short Message Service (SMS), 3GPP TS 23.040, 2010.
61.
go back to reference Androulidakis I, Basios C (2008). A plain type of mobile attack: Compromise of user’s privacy through a simple implementation method. In: 3rd International conference on communication systems software and middleware and workshops, , 6–10 Jan 2008. COMSWARE 2008, pp 465–470doi:10.1109/COMSWA.2008.4554458 Androulidakis I, Basios C (2008). A plain type of mobile attack: Compromise of user’s privacy through a simple implementation method. In: 3rd International conference on communication systems software and middleware and workshops, , 6–10 Jan 2008. COMSWARE 2008, pp 465–470doi:10.​1109/​COMSWA.​2008.​4554458
62.
go back to reference 3GPP, 3rd Generation Partnership Project, Technical Specification Group Core Network and Terminals, Alphabets and language-specific information, 3GPP TS 23.038, 2010. 3GPP, 3rd Generation Partnership Project, Technical Specification Group Core Network and Terminals, Alphabets and language-specific information, 3GPP TS 23.038, 2010.
63.
go back to reference Kune DF, Koelndorfer J, Hopper N, Kim Y (2012) Location Leaks on the GSM Air Interface, Internet Society. In: 19th Annual network & distributed system security symposium, ISOC-NDSS Kune DF, Koelndorfer J, Hopper N, Kim Y (2012) Location Leaks on the GSM Air Interface, Internet Society. In: 19th Annual network & distributed system security symposium, ISOC-NDSS
64.
go back to reference 3GPP, 3rd Generation Partnership Project, Technical Specification Group Core Network and Terminals, Mobile radio interface Layer 3 specification, Core network protocols, 3GPP TS 24.008, 2015 3GPP, 3rd Generation Partnership Project, Technical Specification Group Core Network and Terminals, Mobile radio interface Layer 3 specification, Core network protocols, 3GPP TS 24.008, 2015
65.
66.
go back to reference Hypponen M (2005) Mobile phone threats, HITBSecConf2005. Kuala Lumpur, Malaysia Hypponen M (2005) Mobile phone threats, HITBSecConf2005. Kuala Lumpur, Malaysia
67.
go back to reference Grand J (2004) Introduction to mobile device insecurity. Black Hat Europe Grand J (2004) Introduction to mobile device insecurity. Black Hat Europe
68.
go back to reference Sima C (2004) Security for handhelds and cell phones attacks and theories. Interoop Las Vegas Sima C (2004) Security for handhelds and cell phones attacks and theories. Interoop Las Vegas
69.
go back to reference Greene K (2007) Securing cell phones. MIT Technology Review Greene K (2007) Securing cell phones. MIT Technology Review
70.
go back to reference Bickford J, O’Hare R, Baliga A, Ganapathy V, Liviu I (2010) Rootkits on smart phones: attacks, implications and opportunities, HotMobile’10, Annapolis, Maryland, February 22-23 Bickford J, O’Hare R, Baliga A, Ganapathy V, Liviu I (2010) Rootkits on smart phones: attacks, implications and opportunities, HotMobile’10, Annapolis, Maryland, February 22-23
71.
go back to reference Miller C, Honoroff J, Mason J (2007) Security evaluation of Apple’s iPhone. Independent Security Evaluators Miller C, Honoroff J, Mason J (2007) Security evaluation of Apple’s iPhone. Independent Security Evaluators
72.
go back to reference Mulliner C (2005) Exploiting PocketPC, what the hack Mulliner C (2005) Exploiting PocketPC, what the hack
73.
go back to reference Mulliner C (2006) Security of smart phones. University of California, Berkeley Mulliner C (2006) Security of smart phones. University of California, Berkeley
74.
go back to reference Mulliner C. Using labeling to prevent cross-service attacks against smart phones, DIMVA2006 Mulliner C. Using labeling to prevent cross-service attacks against smart phones, DIMVA2006
75.
go back to reference Mulliner C (2008) Attacking NFC mobile phones. EUSecWest Mulliner C (2008) Attacking NFC mobile phones. EUSecWest
76.
go back to reference Mulliner C (2006) Advanced attacks against PocketPC phones. DEFCON 14 Mulliner C (2006) Advanced attacks against PocketPC phones. DEFCON 14
77.
go back to reference de Haas J (2005) Symbian phone Security, Blackhat de Haas J (2005) Symbian phone Security, Blackhat
78.
go back to reference Spaar D (2009) Playing with GSM RF interface, 26C3, Berlin Spaar D (2009) Playing with GSM RF interface, 26C3, Berlin
Metadata
Title
Introduction: Confidentiality, Integrity, and Availability Threats in Mobile Phones
Author
Iosif I. Androulidakis
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-29742-2_1