Comprehensive review and analysis of anti-malware apps for smartphones

M Talal, AA Zaidan, BB Zaidan, OS Albahri… - Telecommunication …, 2019 - Springer
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …

Modeling and analysis of RRC-based signalling storms in 3G networks

G Gorbil, OH Abdelrahman, M Pavloski… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Mobile networks are vulnerable to signaling attacks and storms that are caused by traffic
patterns that overload the control plane, and differ from distributed denial of service attacks …

Detection, traceability, and propagation of mobile malware threats

L Chen, C **a, S Lei, T Wang - IEEE Access, 2021 - ieeexplore.ieee.org
In recent years, the application of smartphones, Android operating systems and mobile
applications have become more prevalent worldwide. To study the traceability, propagation …

Security for smart mobile networks: The NEMESYS approach

E Gelenbe, G Gorbil, D Tzovaras… - … on Privacy and …, 2013 - ieeexplore.ieee.org
The growing popularity of smart mobile devices such as smartphones and tablets has made
them an attractive target for cyber-criminals, resulting in a rapidly growing and evolving …

[PDF][PDF] Cellpot: A concept for next generation cellular network honeypots

S Liebergeld, M Lange, R Borgaonkar - Internet Society, 2014 - ndss-symposium.org
Smartphones have been shown to be vulnerable. Similarly, cellular networks have been
shown to be vulnerable to denial of service attacks through signaling. Attackers can use …

Signaling attacks in mobile telephony

M Pavloski, E Gelenbe - 2014 11th International Conference on …, 2014 - ieeexplore.ieee.org
Mobile telephony based on UMTS uses finite-state control schemes for wireless channels
and for signaling across the network. These schemes are used systematically in various …

[PDF][PDF] Nomadic honeypots: A novel concept for smartphone honeypots

S Liebergeld, M Lange, C Mulliner - Proc. W'shop on Mobile Security …, 2013 - Citeseer
Intelligence on mobile threats is a valuable asset. Honeypots showed to provide a good
resource to gain threat intelligence in other areas. Unfortunately, current malware largely …

USB connection vulnerabilities on android smartphones: Default and vendors' customizations

A Pereira, M Correia, P Brandão - … and Multimedia Security: 15th IFIP TC 6 …, 2014 - Springer
We expose an USB vulnerability in some vendors' customization of the android system,
where the serial AT commands processed by the cellular modem are extended to allow …

Security analysis and protection based on smali injection for android applications

J Xu, S Li, T Zhang - Algorithms and Architectures for Parallel Processing …, 2014 - Springer
Smali code and. Dex file can be completely compiled and decompiled reciprocally. Thus any
new functions can be injected into an existing android application directly after decompiling …

Control of maximum transmission unit size discovery using AT commands

CC Huang-Fu, CHU Weirong, YS Jheng - US Patent 10,142,251, 2018 - Google Patents
(57) ABSTRACT A method of control Maximum Transmission Unit (MTU) reporting and
discovery using AT commands is proposed. In communications networks, the MTU of a …