Vulnerability of the smartphone applications to connect with compromised access point
- Authors
- Park M.-W.[Park M.-W.]; Chung T.-M.[Chung T.-M.]
- Issue Date
- 2013
- Keywords
- compromised access point; smartphone application security; smartphone security
- Citation
- 2013 International Conference on Information Science and Applications, ICISA 2013
- Journal Title
- 2013 International Conference on Information Science and Applications, ICISA 2013
- URI
- https://scholarworks.bwise.kr/skku/handle/2021.sw.skku/62582
- DOI
- 10.1109/ICISA.2013.6579428
- Abstract
- Nowadays, people are able to use services like banking, reservation, social network services and etc, which are provided in the form of a smartphone application on the basis of the Internet. Smartphone can access the Internet by using the cellular network or Wi-Fi interface, whenever and wherever the user wants. The users generally prefer to access the Internet through Wi-Fi interface rather than the cellular network, because usage fee of the cellular network is very expensive and speed is slower than Wi-Fi interface. As a result, most people search for open access point and connect to it when they want to use wireless Internet even though this access point is unknown. However, this inconsiderate connection with unknown access point is very dangerous. If users get connected to the compromised access point, malicious hacker is able to intercept or modify every packet that is transmitted from or to the user smartphone. In other words, malicious hacker can do various Man-In-The-Middle attacks to the user. In this paper, we explain vulnerability of the android applications to connect with compromised access point. © 2013 IEEE.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - Information and Communication Engineering > Information and Communication Engineering > 1. Journal Articles
- Computing and Informatics > Computer Science and Engineering > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/skku/handle/2021.sw.skku/62582)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.