Skip to main content

2011 | OriginalPaper | Buchkapitel

Mobile Information Warfare: A Countermeasure to Privacy Leaks Based on SecureMyDroid

verfasst von : A. Grillo, A. Lentini, G. Me

Erschienen in: Information Technology and Innovation Trends in Organizations

Verlag: Physica-Verlag HD

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile device privacy is becoming increasingly important, as business information and personal information moves from personal computer to laptop and handheld devices. These data, enhanced with the raising computational and storage power of current mobile devices, lead to prefigure an enlarged scenario, where people will use massively smartphones for daily activities, regardless they are personal affairs or work. Hence, mobile devices represent an attractive target for attacks to the privacy of their owners. In particular, SpyPhone applications represent a big concern for confidential activities, acting as a bug and menacing both voice calls and data exchanged/stored mainly in form of text and multimedia messages and electronic mails. This paper proposes a new methodological approach to protect mobile devices from threats related to the privacy of mobile device owner. In particular, we suggest the cooperation of SecureMyDroid, a customized release of the Android OS, and the open source forensic tool Mobile Internal Acquisition Tool, to prevent privacy leaks related to SpyPhone applications attacks. Experimental results show the suitability of the proposed strategy in order to support the detection of SpyPhone application installed on the mobile device.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat S. Perelsonl and R. Botha, “An investigation into access control for mobile devices,” in Proceedings of the 4th annual ISSA Information Security Conference, June 2004. S. Perelsonl and R. Botha, “An investigation into access control for mobile devices,” in Proceedings of the 4th annual ISSA Information Security Conference, June 2004.
4.
Zurück zum Zitat Distefano, G. Me, An overall assessment of Mobile Internal Acquisition Tool, Proc. of 2008 Digital Forensic Research Workshop (DFRWS), Elsevier Journal of Digital Investigation 2008, vol. 5, pp. 121–127. Distefano, G. Me, An overall assessment of Mobile Internal Acquisition Tool, Proc. of 2008 Digital Forensic Research Workshop (DFRWS), Elsevier Journal of Digital Investigation 2008, vol. 5, pp. 121–127.
5.
Zurück zum Zitat A. Distefano, A. Grillo, A. Lentini and G. F. Italiano. “SecureMyDroid: Enforcing Security in the Mobile Devices Lifecycle”, 6th Annual Cyber Security and Information Intelligence Research Workshop, CSIIRW, April 21 - 23, 2010, Oak Ridge, TN, USA. A. Distefano, A. Grillo, A. Lentini and G. F. Italiano. “SecureMyDroid: Enforcing Security in the Mobile Devices Lifecycle”, 6th Annual Cyber Security and Information Intelligence Research Workshop, CSIIRW, April 21 - 23, 2010, Oak Ridge, TN, USA.
6.
Zurück zum Zitat M. Breeuwsma, Forensic Imaging of Embedded Systems Using JTAG (Boundary-Scan), Digital Investigation, Volume 3, Issue 1, 2006, pp. 32–42. M. Breeuwsma, Forensic Imaging of Embedded Systems Using JTAG (Boundary-Scan), Digital Investigation, Volume 3, Issue 1, 2006, pp. 32–42.
7.
Zurück zum Zitat S. Willassen, Forensic Analysis of Mobile Phone Internal Memory, IFIP WG 11.9 International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005, in Advances in Digital Forensics, Vol. 194, Pollitt, M.; Shenoi, S. (Eds.), XVIII, 313 p., 2006. S. Willassen, Forensic Analysis of Mobile Phone Internal Memory, IFIP WG 11.9 International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005, in Advances in Digital Forensics, Vol. 194, Pollitt, M.; Shenoi, S. (Eds.), XVIII, 313 p., 2006.
8.
Zurück zum Zitat Jaquith, Security Metrics: Replacing Fear, Uncertainty, and Doubt, Addison-Wesley Professional, 2007. Jaquith, Security Metrics: Replacing Fear, Uncertainty, and Doubt, Addison-Wesley Professional, 2007.
9.
Zurück zum Zitat Sir P. Kennedy, Report of the Interception of Communications Commissioner for 2008, July 21, 2009. Sir P. Kennedy, Report of the Interception of Communications Commissioner for 2008, July 21, 2009.
10.
Zurück zum Zitat Italian Parliamentary Committee for the Security of the Republic (COPASIR), Annual Report, July 29, 2009 available on line in Italian. Italian Parliamentary Committee for the Security of the Republic (COPASIR), Annual Report, July 29, 2009 available on line in Italian.
11.
Zurück zum Zitat R. Bertè, F. Dellutri, A. Grillo, A. Lentini, G. Me, V. Ottaviani, “Fast smartphones forensic analysis results through MIAT and Forensic Farm”, International Journal of Electronic Security and Digital Forensics, IJESDF, Inderscience, Vol. 2, No. 1, 2009, PP. 18–28. R. Bertè, F. Dellutri, A. Grillo, A. Lentini, G. Me, V. Ottaviani, “Fast smartphones forensic analysis results through MIAT and Forensic Farm”, International Journal of Electronic Security and Digital Forensics, IJESDF, Inderscience, Vol. 2, No. 1, 2009, PP. 18–28.
12.
Zurück zum Zitat A. Distefano, A. Grillo, A. Lentini, G. Me, and D. Tulimiero, “Mobile Forensics Data Integrity Assessment by Event Monitoring”, Small Scale Digital Device Forensic Journal (SSDDFJ) http://www.ssddfj.org. A. Distefano, A. Grillo, A. Lentini, G. Me, and D. Tulimiero, “Mobile Forensics Data Integrity Assessment by Event Monitoring”, Small Scale Digital Device Forensic Journal (SSDDFJ) http://​www.​ssddfj.​org.
Metadaten
Titel
Mobile Information Warfare: A Countermeasure to Privacy Leaks Based on SecureMyDroid
verfasst von
A. Grillo
A. Lentini
G. Me
Copyright-Jahr
2011
Verlag
Physica-Verlag HD
DOI
https://doi.org/10.1007/978-3-7908-2632-6_52

Premium Partner