3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE

Research Article

A Plain Type of Mobile Attack: Compromise of User’s Privacy through a Simple Implementation Method

  • @INPROCEEDINGS{10.1109/COMSWA.2008.4554458,
        author={Iosif Androulidakis and Chris Basios},
        title={A Plain Type of Mobile Attack: Compromise of User’s Privacy through a Simple Implementation Method},
        proceedings={3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2008},
        month={6},
        keywords={GSM SMS Ping Monitoring Mobile Security Privacy DoS},
        doi={10.1109/COMSWA.2008.4554458}
    }
    
  • Iosif Androulidakis
    Chris Basios
    Year: 2008
    A Plain Type of Mobile Attack: Compromise of User’s Privacy through a Simple Implementation Method
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2008.4554458
Iosif Androulidakis1,*, Chris Basios2,*
  • 1: Network Operations Center University of Ioannina University Campus 451-10 Dourouti, GREECE
  • 2: Computer Networks Laboratory National Technical Univ. of Athens Heroon Politechneiou 9 151-22 Zografou, GREECE
*Contact email: sandro@noc.uoi.gr, cbas@telecom.ntua.gr

Abstract

An easy way to determine the state of a cell phone without the owner’s knowledge is presented in this paper. The described method, combined with a form of patterning mobile user’s behavior (in terms of evaluating the mobile phone’s state in a tactical way) could lead to privacy compromise revealing his whereabouts. The technical part of the paper is based on the Short Messaging Service and the offered service of Receipt Report, manipulated in such a way as not to reveal any information to the targeted user. In addition, this method can provide known plain texts for an attack on A5.