UDC 621.395:004.491.23, DOI:10.2298/CSIS090330027F

Trojan horses in mobile devices

Daniel Fuentes1, Juan A. �lvarez1, Juan A. Ortega1, Luis Gonzalez-Abril2 and Francisco Velasco2

  1. Departamento de Lenguajes y Sistemas Inform�ticos Universidad de Sevilla
    Avda. Reina Mercedes s/n, 41012, Seville, Spain
    {dfuentes, jaalvarez, jortega}@us.es
  2. Departamento de Econom�a Aplicada I Universidad de Sevilla
    Avda. Ram�n y Cajal 1, 41018, Seville, Spain
    {luisgon,velasco}@us.es

Abstract

This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a user's contacts information through the previous installation of the Trojan horse. The results show that this process means a loss of information and a quantified cost to the attacked user too. This paper proposes different solutions to avoid this malware and its effects.

Key words

Mobile security, Mobile Infections, Trojan horses

Digital Object Identifier (DOI)

https://doi.org/10.2298/CSIS090330027F

Publication information

Volume 7, Issue 4 (December 2010)
Year of Publication: 2010
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium

Full text

DownloadAvailable in PDF
Portable Document Format

How to cite

Fuentes, D., �lvarez, J. A., Ortega, J. A., Gonzalez-Abril, L., Velasco, F.: Trojan horses in mobile devices. Computer Science and Information Systems, Vol. 7, No. 4, 813-822. (2010), https://doi.org/10.2298/CSIS090330027F