Download PDFOpen PDF in browser

Mobile Devices Vulnerabilities

10 pagesPublished: March 18, 2022

Abstract

With the increase in popularity of mobile devices for personal and business reasons, they have become even more attractive targets to malicious actors. There are many vulnerabilities with any mobile device, though some environments, features, and operating systems are at higher risk than others for certain attacks. This paper discusses such vulnerabilities, including the elements that allow them, methods of exploiting them, and one might combat attacks on mobile devices.

Keyphrases: Apps, cryptomining, Keyloggers, Madware, Malware, Trojan

In: Bidyut Gupta, Ajay Bandi and Mohammad Hossain (editors). Proceedings of 37th International Conference on Computers and Their Applications, vol 82, pages 92--101

Links:
BibTeX entry
@inproceedings{CATA2022:Mobile_Devices_Vulnerabilities,
  author    = {Melissa Schneider and Md Minhaz Chowdhury and Shadman Latif},
  title     = {Mobile Devices Vulnerabilities},
  booktitle = {Proceedings of 37th International Conference on Computers and Their Applications},
  editor    = {Bidyut Gupta and Ajay Bandi and Mohammad Hossain},
  series    = {EPiC Series in Computing},
  volume    = {82},
  pages     = {92--101},
  year      = {2022},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {https://easychair.org/publications/paper/qwrF},
  doi       = {10.29007/kg5j}}
Download PDFOpen PDF in browser