UDC 621.395:004.491.23, DOI:10.2298/CSIS090330027F
Trojan horses in mobile devices
- Departamento de Lenguajes y Sistemas Inform�ticos Universidad de Sevilla
Avda. Reina Mercedes s/n, 41012, Seville, Spain
{dfuentes, jaalvarez, jortega}@us.es - Departamento de Econom�a Aplicada I Universidad de Sevilla
Avda. Ram�n y Cajal 1, 41018, Seville, Spain
{luisgon,velasco}@us.es
Abstract
This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a user's contacts information through the previous installation of the Trojan horse. The results show that this process means a loss of information and a quantified cost to the attacked user too. This paper proposes different solutions to avoid this malware and its effects.
Key words
Mobile security, Mobile Infections, Trojan horses
Digital Object Identifier (DOI)
https://doi.org/10.2298/CSIS090330027F
Publication information
Volume 7, Issue 4 (December 2010)
Year of Publication: 2010
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium
Full text
Available in PDF
Portable Document Format
How to cite
Fuentes, D., �lvarez, J. A., Ortega, J. A., Gonzalez-Abril, L., Velasco, F.: Trojan horses in mobile devices. Computer Science and Information Systems, Vol. 7, No. 4, 813-822. (2010), https://doi.org/10.2298/CSIS090330027F