Abstract
In this introductory chapter, we will briefly describe and group as many as possible of the threats in confidentiality, integrity, and availability that mobile phones are facing. As such, it will be the basis for the discussions that will follow in the next chapters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Suominen M. GSM security, Helsinki University of Technology
Lord S (2003) Modern GSM insecurities. X-Force Security. Assessments White Paper. www.iss.net
Huynh T, Nguyen H. Overview of GSM and GSM security. Department of Electrical Engineering and Computer Science Oregon State University
Quirke J (2004) Security in the GSM system. AusMobile
Gadaix E (2001) GSM and 3G security. Black Hat Asia 2001
Gadaix E (2006) NGN Security, Bellua Cyber Security 2006
Gadaix E (2003) GSM operators security, xcon
Preneel B. Mobile network security. Katholieke Universiteit Leuven
Lord S (2003) Trouble at the Telco: when GSM goes bad. Network Security 2003(1):10–12
Yousef P. GSM-security: a survey and evaluation of the current situation. ISY, Linköping Institute of Technology
Androulidakis I (2009) Security in GSM and in mobile phones. IT Security Professional Magazine, Issue 9, pp 35–41
Androulidakis I (2006) This is how hackers hack into our cell phones. Sunday Newspaper “To proto thema” Issue 90, pp 40–41
Androulidakis I (2006) Security issues in cell phones. Defence and Diplomacy Magazine, Issue 187, pp 100–102
Nohl K, Krißler S (2009) Subverting the security base of GSM. HAR2009
Nohl K, Paget C (2009) GSM—SRSLY? 26C3, Berlin
Pesonen L (1999) GSM interception. Department of Computer Science and Engineering, Helsinki University of Technology
Shoghi Communications Limited, Interception and monitoring of SMS & voice communications on GSM 850/900/1800/1900 MHz networks
Cryptome.org (2005) Interception of GSM cellphones
Patel S, Eavesdropping without breaking the GSM encryption algorithm. 3GPP TSG SA WG3 Security — SA3#33 S3-040360. 10–14 May 2004. Beijing, China
Fernandez-Iglesias MJ (2002) On the application of formal description techniques to the design of interception systems for GSM mobile terminals. J Syst Softw 60:51–58
Androulidakis I (2009) Intercepting mobile phones. IT security Professional Magazine, Issue 8, pp 42–48
Androulidakis I (2011) Intercepting mobile phone calls and short messages using a GSM Tester. In: Proceedings of CN2011, Springer CCIS 160, pp 281–288
Rieger F (2005) New interception threats from non-state actors and software-based voice encryption. IEE Secure Mobile Communications
ETTUS USRP. www.ettus.com
GnuRadio. http://gnuradio.org
OpenBTS. http://openbts.sourceforge.net
OsmocomBB. http://bb.osmocomm.org
The A5 Cracking Project. http://opensource.srlabs.de/projects/a51-decrypt
Hulton D, Mueller S (2008) Intercepting mobile phone/GSM traffic. BlackHat Europe2008
Tracelog. http://svn.berlin.ccc.de/projects/airprobe/wiki/tracelog
Gammu. http://www.gammu.org
GSM A5 files on Cryptome. http://cryptome.org/0001/gsm-a5-files.htm
Biryukov A, Shamir A, Wagner D (2000) Real time cryptanalysis of A5/1 on a PC. In: Fast Softward Encryption, Springer-Verlag, pp 1–18
Barkan E, Biham E, Keller N (2008) Instant ciphertext-only cryptanalysis of GSM encrypted communication. Journal of cryptology archive, Springer, New York, Inc. Secaucus, NJ, USA, vol 21(3), March 2008. doi 10.1007/s00145-007-9001-y
Golic J (1997) Cryptanalysis of alleged A5 stream cipher. http://cryptome.org/jya/a5-hack.htm
Briceno M, Goldberg I, Wagner D. A pedagogical implementation of the GSM A5/1 and A5/2 voice privacy encryption algorithms. http://www.cryptome.org/gsm-a512.htm
Vodafone Griechenland im Visier der Ermittler, dsltarife.net/news, 2006
Prevelakis V (2007) The Athens affair. IEEE Spectrum
Laitinen H (2001) Cellular location technology. CELLO-WP2-VTT-D03-007-Int Deliverable of IST-2000-25382-CELLO, Cellular Network Optimisation Based on Mobile Location
Warnock M, Geolocation via cell tower data. http://www.warnockinc.com/. Accessed Dec 2011
Engel T (2008) Locating mobile phones using signaling system #7. In: 25th Chaos communication congress, 2008
Androulidakis I (2011) Locating a GSM phone in a given area without user consent. In: Presentation in hack.lu 2011 conference, Luxembourg, 19 Sept 2011
Welte H (2009) Report of OpenBSC GSM field test, HAR2009
Hynninen H (2000) Experiences in mobile phone fraud, HUT TML 2000
Müller M (1999) Intruder scenarios in telecom networks, Faculty of Computer Science, Helsinki University of Technology. http://www.niksula.cs.hut.fi/∼mmuller/NETSEC/paper.html. Accessed Dec 2011
Shawe-Taylor J, Howker K (1999) Detection of fraud in mobile telecommunications information security technical report, vol 4(1)
Androulidakis I (2011) Combating telecommunications cybercrime, 3hour course. High-Tech Crime Department of the National Bureau of Investigation of Hungary, Budapest
Androulidakis I (2010) Detecting cybercrime in modern telecommunication systems. In: European Police College (CEPOL), Seminar 64/2010, Cyber Crime & High Tech, Athens, 18–21 May 2010
Androulidakis I (2011) Cybercrime in mobile telephony systems. In: European Police College (CEPOL), Seminar 62/2011, High Tech & Cyber Crime, Brdo near Kranj, Slovenia, 20 Oct 2011
Cadonau J (2008) OTA and secure SIM lifecycle management smart cards, tokens, security and applications. Springer, New York
Bocan V, Cretu V (2006) Mitigating denial of service threats in GSM networks. ARES 2006
Bocan V, Cretu V (2004) Security and denial of service threats in GSM networks. Periodica Politechnica, Trans Autom Control Comput Sci 49(63) 2004, ISSN 1224-600x
Miller C, Mulliner C (2009) Fuzzing the phone in your phone. http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller-FuzzingPhone-SLIDES.pdf
Mulliner C, Golde N, Seifert J-P (2011) SMS of death: from analyzing to attacking mobile phones on a large scale. In: 20th USENIX security symposium
Windows phone sms attack discovered reboots device and disables messaging hub, 2011. http://www.winrumors.com/windows-phone-sms-attack-discovered-reboots-device-and-disables-messaging-hub
Engel T (2008) Remote SMS/MMS denial of service—“curse of silence” for Nokia S60 phones. http://berlin.ccc.de/~tobias/cursesms.txt
Morreeuw J (2002) Securite des mobiles GSM. http://jf.morreeuw.free.fr/security/gsm.html. Accessed Dec 2011
Hypponen M (2005) Mobile phone threats. In: HITBSecConf2005, Kuala Lumpur, Malaysia
Grand J (2004) Introduction to mobile device insecurity. Black Hat Europe
Sima C. Security for handhelds and cell phones attacks and theories. Interop Las Vegas, 2004
Greene K (2007) Securing cell phones. MIT Technology Review. http://www.technologyreview.com/communications/19130/
Bickford J, O’Hare R, Baliga A, Ganapathy V, Iftode L (2010) Rootkits on smart phones: attacks, implications and opportunities. HotMobile’10
Miller C, Honoroff J, Mason J (2007) Independent Security Evaluators, July 19, 2007
Mulliner C (2005) Exploiting PocketPC. What the hack, July 2005
Mulliner C (2006) Security of smart phones. University of California
Mulliner C (2006) Using labeling to prevent cross-service attacks against smart phones. DIMVA2006
Mulliner C (2008) Attacking NFC mobile phones. EUSecWest, 2008
Mulliner C (2006) Advanced attacks against PocketPC phones. DEFCON 14, 2006
de Haas J (2005) Symbian phone Security. Blackhat 2005
Spaar D (2009) Playing with GSM RF interface. 26C3, Berlin
The Spyphone Guy. http://www.spyphoneguy.com/
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media New York
About this chapter
Cite this chapter
Androulidakis, I.I. (2012). Introduction: Confidentiality, Integrity, and Availability Threats in Mobile Phones. In: Mobile Phone Security and Forensics. SpringerBriefs in Electrical and Computer Engineering(). Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-1650-0_1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1650-0_1
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4614-1649-4
Online ISBN: 978-1-4614-1650-0
eBook Packages: EngineeringEngineering (R0)