• DocumentCode
    3544294
  • Title

    On forensics: A silent SMS attack

  • Author

    Croft, Neil

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Pretoria, Pretoria, South Africa
  • fYear
    2012
  • fDate
    15-17 Aug. 2012
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    Silent messages often referred to as Silent SMS or Stealth SMS, when delivered to a mobile handset is indicated neither on the display nor by an acoustic alert signal. In the paper [2], the authors highlighted the technical details of sending a silent SMS, furthermore sending multiple incessant silent SMSs performing A silent SMS denial of Service (DoS) attack. These stealth messages are not only used to perform DoS attacks but are increasingly sent in order to force the continuous update of subscriber location information. In doing so, anyone with access to the network infrastructure, may use the technology to better track the movements of any subscriber on the mobile network. This paper describes, from a forensic perspective, how a silent application-generated SMS (attack) is discovered. We then investigate the possibilities of retrieving silent SMS evidence at both the handset and network level. Furthermore, using propositional logic, we explore related SMS network configurations which might thwart the forensic ability of a silent SMS attack.
  • Keywords
    computer forensics; mobile computing; DoS; SMS denial of service attack; acoustic alert signal; mobile handset; mobile network; mobile station; network infrastructure; silent SMS attack; silent messages; stealth SMS; Forensics; GSM; Mobile communication; Mobile computing; Protocols; Telecommunication standards; Telephone sets; Forensics; SMS; mobile; silent; stealth;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security for South Africa (ISSA), 2012
  • Conference_Location
    Johannesburg, Gauteng
  • Print_ISBN
    978-1-4673-2160-0
  • Type

    conf

  • DOI
    10.1109/ISSA.2012.6320454
  • Filename
    6320454