Security and privacy for 6G: A survey on prospective technologies and challenges
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …
ground integrated network environment, novel technologies, and an accessible user …
A survey on security for mobile devices
M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …
to access a large variety of ubiquitous services. In recent years, the availability of these …
Dissecting android malware: Characterization and evolution
The popularity and adoption of smart phones has greatly stimulated the spread of mobile
malware, especially on the popular platforms such as Android. In light of their rapid growth …
malware, especially on the popular platforms such as Android. In light of their rapid growth …
A survey of mobile malware in the wild
Mobile malware is rapidly becoming a serious threat. In this paper, we survey the current
state of mobile malware in the wild. We analyze the incentives behind 46 pieces of iOS …
state of mobile malware in the wild. We analyze the incentives behind 46 pieces of iOS …
Botnets: A survey
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …
serious threat to the Internet. Such networks have been created to conduct large-scale …
LTEInspector: A systematic approach for adversarial testing of 4G LTE
In this paper, we investigate the security and privacy of the three critical procedures of the
4G LTE protocol (ie, attach, detach, and paging), and in the process, uncover potential …
4G LTE protocol (ie, attach, detach, and paging), and in the process, uncover potential …
[PDF][PDF] Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
We explore the threat of smartphone malware with access to on-board sensors, which opens
new avenues for illicit collection of private information. While existing work shows that such …
new avenues for illicit collection of private information. While existing work shows that such …
Evolution, detection and analysis of malware for smart devices
Smart devices equipped with powerful sensing, computing and networking capabilities have
proliferated lately, ranging from popular smartphones and tablets to Internet appliances …
proliferated lately, ranging from popular smartphones and tablets to Internet appliances …
Touching the untouchables: Dynamic security analysis of the LTE control plane
This paper presents our extensive investigation of the security aspects of control plane
procedures based on dynamic testing of the control components in operational Long Term …
procedures based on dynamic testing of the control components in operational Long Term …
A first look at cellular machine-to-machine traffic: large scale measurement and characterization
Cellular network based Machine-to-Machine (M2M) communication is fast becoming a
market-changing force for a wide spectrum of businesses and applications such as …
market-changing force for a wide spectrum of businesses and applications such as …