Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

نویسندگان

چکیده

There is an exponential rise in the use of smartphones government and private institutions due to business dependencies such as communication, virtual meetings, access global information. These are attractive target for cybercriminals one leading causes cyber espionage sabotage. A large number sophisticated malware attacks well advanced persistent threats (APTs) have been launched on smartphone users. becoming significantly more complex, sophisticated, persistent, undetected extended periods. Traditionally, devices targeted by exploiting a vulnerability operating system (OS) or device sensors. Nevertheless, there APTs, side-channel attacks, sensor-based through Google Play Store. Previous research contributions lacked contemporary threats, some proven ineffective against latest variants mobile system. In this paper, we conducted extensive survey papers over last 15 years (2009–2023), covering vulnerabilities, corresponding defenses. The highlights classifies variants, defines how sensors exploited, visualizes multiple ways that launched, provides comprehensive list families spread addition, details threat defense solutions, detection tools techniques presented decade. Finally, it open issues identifies gap needs be addressed meet challenges next-generation smartphones.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Side channel parameter characteristics of code injection attacks

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

متن کامل

Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses

Over last two decades, side and covert channel research has shown variety of ways of exfiltrating information for a computer system. Processor microarchitectural side and covert channel attacks have emerged as some of the most clever attacks, and ones which are difficult to deal with, without impacting system performance. Unlike electromagnetic or power-based channels, microarchitectural side a...

متن کامل

A Tutorial on Physical Security and Side-Channel Attacks

A recent branch of cryptography focuses on the physical constraints that a real-life cryptographic device must face, and attempts to exploit these constraints (running time, power consumption, . . . ) to expose the device’s secrets. This gave birth to implementation-specific attacks, which often turned out to be much more efficient than the best known cryptanalytic attacks against the underlyin...

متن کامل

Towards Security Limits in Side-Channel Attacks

In this paper, we consider a recently introduced framework that investigates physically observable implementations from a theoretical point of view. The model allows quantifying the effect of practically relevant leakage functions with a combination of security and information theoretic metrics. More specifically, we apply our evaluation methodology to an exemplary block cipher. We first consid...

متن کامل

Side-channel attacks based on linear approximations

Power analysis attacks against embedded secret key cryptosystems are widely studied since the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun in 1998 where has been introduced the powerful Differential Power Analysis. The strength of DPA is such that it became necessary to develop sound and efficient countermeasures. Nowadays embedded cryptographic primitives usually integrate on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Technologies (Basel)

سال: 2023

ISSN: ['2227-7080']

DOI: https://doi.org/10.3390/technologies11030076