Trojan horses in mobile devices
نویسندگان
چکیده
منابع مشابه
Event-Based Method for Detecting Trojan Horses in Mobile Devices
Mobile phones and wireless technology and its constant evolution have, in the last years, revolutionized the way in which we communicate and work. However, one of the main barriers encounter in the use of these technologies is data security. Trojan horses are dangerous software to attack phones, PDAs and Smartphones. New versions are created everyday to attack the functionality, theft the store...
متن کاملUDC 621.395:004.491.23, DOI:10.2298/CSIS090330027F Trojan horses in mobile devices
This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a...
متن کاملOn Trojan Horses in Compiler Implementations
This paper is to present a security-related motivation for compiler veriication, and in particular for binary compiler implementation veriication. We will prove that source level veriication is not suu-cient in order to guarantee compiler correctness. For this, we will adopt the scenario of a well-known attack to Unix operating system programs due to intruded Trojan Horses in compiler executabl...
متن کاملSiderophores as “Trojan Horses”: tackling multidrug resistance?
Microbial drug resistance is partly due to hindered diffusion through the membrane of microbial cells and active transport mechanisms. An approach to counter such resistance uses the bacterial iron transport system. Extracellular free iron is scarce in vertebrates, yet essential for microbial growth (Anderson et al., 2012). A mechanism displayed by microbial pathogens to cope with iron scarcity...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Science and Information Systems
سال: 2010
ISSN: 1820-0214,2406-1018
DOI: 10.2298/csis090330027f