Detailed Information

Cited 3 time in webofscience Cited 4 time in scopus
Metadata Downloads

Cyber Threats To Mobile Messenger Apps From Identity Cloning

Full metadata record
DC Field Value Language
dc.contributor.authorPark, Suwan-
dc.contributor.authorSeo, Changho-
dc.contributor.authorYi, Jeong Hyun-
dc.date.available2018-05-09T07:15:09Z-
dc.date.created2018-04-17-
dc.date.issued2016-06-
dc.identifier.issn1079-8587-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/8522-
dc.description.abstractPeople enjoy connecting to the Internet outside of their homes and offices, due to technological innovations and the convenience. With smartphones and other mobile devices giving us the ability to conduct everyday activities such as mobile banking, online shopping, and social networking, cyber criminals are constantly looking to take advantage of insecure wireless networks, third party applications, and texting to your personal information, steal your identity, or read personal e-mails and work documents. Such cyber threats become very high, in particular, with Android apps since they are structurally easy to rebuild, to modify or inject arbitrary code. When an adversary has victim's credential files in a local device, this vulnerability becomes more solemn. While the adversary can bypass all applied security techniques and forge an identity completely, he can do everything that victim can. If a mobile messenger app was selected as an attack model, the adversary is able to not only view chat history and timeline records of a specific user but to also receive or send messages in real time. In this paper, we analyze the security weak points of representative Android message apps and prove this is realistic threat in cyber defense. We then propose alternative solutions against this attack.-
dc.language영어-
dc.language.isoen-
dc.publisherTAYLOR & FRANCIS INC-
dc.relation.isPartOfINTELLIGENT AUTOMATION AND SOFT COMPUTING-
dc.subjectATTACK-
dc.titleCyber Threats To Mobile Messenger Apps From Identity Cloning-
dc.typeArticle-
dc.identifier.doi10.1080/10798587.2015.1118276-
dc.type.rimsART-
dc.identifier.bibliographicCitationINTELLIGENT AUTOMATION AND SOFT COMPUTING, v.22, no.3, pp.379 - 387-
dc.description.journalClass1-
dc.identifier.wosid000380901000007-
dc.identifier.scopusid2-s2.0-84951280715-
dc.citation.endPage387-
dc.citation.number3-
dc.citation.startPage379-
dc.citation.titleINTELLIGENT AUTOMATION AND SOFT COMPUTING-
dc.citation.volume22-
dc.contributor.affiliatedAuthorYi, Jeong Hyun-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.subject.keywordAuthorAndroid messenger app-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthorrepackaging-
dc.subject.keywordAuthoridentity cloning-
dc.subject.keywordPlusATTACK-
dc.description.journalRegisteredClassscie-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Software > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher YI, JEONG HYUN photo

YI, JEONG HYUN
College of Information Technology (School of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE