Research Article
A Plain Type of Mobile Attack: Compromise of User’s Privacy through a Simple Implementation Method
@INPROCEEDINGS{10.1109/COMSWA.2008.4554458, author={Iosif Androulidakis and Chris Basios}, title={A Plain Type of Mobile Attack: Compromise of User’s Privacy through a Simple Implementation Method}, proceedings={3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE}, publisher={IEEE}, proceedings_a={COMSWARE}, year={2008}, month={6}, keywords={GSM SMS Ping Monitoring Mobile Security Privacy DoS}, doi={10.1109/COMSWA.2008.4554458} }
- Iosif Androulidakis
Chris Basios
Year: 2008
A Plain Type of Mobile Attack: Compromise of User’s Privacy through a Simple Implementation Method
COMSWARE
IEEE
DOI: 10.1109/COMSWA.2008.4554458
Abstract
An easy way to determine the state of a cell phone without the owner’s knowledge is presented in this paper. The described method, combined with a form of patterning mobile user’s behavior (in terms of evaluating the mobile phone’s state in a tactical way) could lead to privacy compromise revealing his whereabouts. The technical part of the paper is based on the Short Messaging Service and the offered service of Receipt Report, manipulated in such a way as not to reveal any information to the targeted user. In addition, this method can provide known plain texts for an attack on A5.
Copyright © 2008–2024 IEEE