DocumentCode :
3544294
Title :
On forensics: A silent SMS attack
Author :
Croft, Neil
Author_Institution :
Dept. of Comput. Sci., Univ. of Pretoria, Pretoria, South Africa
fYear :
2012
fDate :
15-17 Aug. 2012
Firstpage :
1
Lastpage :
4
Abstract :
Silent messages often referred to as Silent SMS or Stealth SMS, when delivered to a mobile handset is indicated neither on the display nor by an acoustic alert signal. In the paper [2], the authors highlighted the technical details of sending a silent SMS, furthermore sending multiple incessant silent SMSs performing A silent SMS denial of Service (DoS) attack. These stealth messages are not only used to perform DoS attacks but are increasingly sent in order to force the continuous update of subscriber location information. In doing so, anyone with access to the network infrastructure, may use the technology to better track the movements of any subscriber on the mobile network. This paper describes, from a forensic perspective, how a silent application-generated SMS (attack) is discovered. We then investigate the possibilities of retrieving silent SMS evidence at both the handset and network level. Furthermore, using propositional logic, we explore related SMS network configurations which might thwart the forensic ability of a silent SMS attack.
Keywords :
computer forensics; mobile computing; DoS; SMS denial of service attack; acoustic alert signal; mobile handset; mobile network; mobile station; network infrastructure; silent SMS attack; silent messages; stealth SMS; Forensics; GSM; Mobile communication; Mobile computing; Protocols; Telecommunication standards; Telephone sets; Forensics; SMS; mobile; silent; stealth;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security for South Africa (ISSA), 2012
Conference_Location :
Johannesburg, Gauteng
Print_ISBN :
978-1-4673-2160-0
Type :
conf
DOI :
10.1109/ISSA.2012.6320454
Filename :
6320454
Link To Document :
بازگشت