Mobile phishing attack for Android platform

Nour Abura'Ed, Hadi Otrok, Rabeb Mizouni, Jamal Bentahar

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

11 Citations (Scopus)

Abstract

In this paper, we address the problem of mobile phishing via the implementation of a Trojan that commits phishing through the mobile's pre-installed applications, which are naturally trusted. It utilizes task interception along with lack of identity indicators, and it overrides the default behavior of some functions to succeed with the attack. We also study the impact of this Trojan on the device's performance. Finally, we propose some security enhancements that do not rely on the human factor, which are categorized as Operating System (OS) Level solutions, and Secure Socket Layer (SSL) solutions.

Original languageEnglish
Title of host publication10th International Conference on Innovations in Information Technology, IIT 2014
Pages18-23
Number of pages6
ISBN (Electronic)9781479972128
DOIs
Publication statusPublished - 16 Dec 2014
Event2014 10th International Conference on Innovations in Information Technology, IIT 2014 - Abu Dhabi, Al-Ain, United Arab Emirates
Duration: 9 Nov 201411 Nov 2014

Publication series

Name2014 10th International Conference on Innovations in Information Technology, IIT 2014

Conference

Conference2014 10th International Conference on Innovations in Information Technology, IIT 2014
Country/TerritoryUnited Arab Emirates
CityAbu Dhabi, Al-Ain
Period9/11/1411/11/14

Keywords

  • Android
  • identity indicator
  • mobile phishing
  • SSL
  • task interception

Fingerprint

Dive into the research topics of 'Mobile phishing attack for Android platform'. Together they form a unique fingerprint.

Cite this