The cyber crime threat on mobile devices

This paper is concerned with highlighting recent and emerging cyber crime threats to mobile devices. The main classes of threat are briefly reviewed, and the history of attacks against mobile systems is summarised. Two case studies of attacks against general-purpose systems not normally thought of as security-sensitive are given, and conclusions are drawn.

[1]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[2]  Eli Biham,et al.  Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, CRYPTO.

[3]  Mikko Hypponen,et al.  Malware goes mobile. , 2006, Scientific American.

[4]  Christof Paar,et al.  KeeLoq and Side-Channel Analysis-Evolution of an Attack , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).

[5]  Christof Paar,et al.  Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed , 2009, AFRICACRYPT.

[6]  Erik Tews,et al.  Practical attacks against WEP and WPA , 2009, WiSec '09.

[7]  Christof Paar,et al.  Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild , 2011, SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks.

[8]  Alessandro Barenghi,et al.  On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs , 2011, CCS '11.

[9]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[10]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[11]  Benedikt Driessen Eavesdropping on Satellite Telecommunication Systems , 2012, IACR Cryptol. ePrint Arch..

[12]  Christof Paar,et al.  Security of Wireless Embedded Devices in the Real World , 2012 .