DocumentCode
3544294
Title
On forensics: A silent SMS attack
Author
Croft, Neil
Author_Institution
Dept. of Comput. Sci., Univ. of Pretoria, Pretoria, South Africa
fYear
2012
fDate
15-17 Aug. 2012
Firstpage
1
Lastpage
4
Abstract
Silent messages often referred to as Silent SMS or Stealth SMS, when delivered to a mobile handset is indicated neither on the display nor by an acoustic alert signal. In the paper [2], the authors highlighted the technical details of sending a silent SMS, furthermore sending multiple incessant silent SMSs performing A silent SMS denial of Service (DoS) attack. These stealth messages are not only used to perform DoS attacks but are increasingly sent in order to force the continuous update of subscriber location information. In doing so, anyone with access to the network infrastructure, may use the technology to better track the movements of any subscriber on the mobile network. This paper describes, from a forensic perspective, how a silent application-generated SMS (attack) is discovered. We then investigate the possibilities of retrieving silent SMS evidence at both the handset and network level. Furthermore, using propositional logic, we explore related SMS network configurations which might thwart the forensic ability of a silent SMS attack.
Keywords
computer forensics; mobile computing; DoS; SMS denial of service attack; acoustic alert signal; mobile handset; mobile network; mobile station; network infrastructure; silent SMS attack; silent messages; stealth SMS; Forensics; GSM; Mobile communication; Mobile computing; Protocols; Telecommunication standards; Telephone sets; Forensics; SMS; mobile; silent; stealth;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Security for South Africa (ISSA), 2012
Conference_Location
Johannesburg, Gauteng
Print_ISBN
978-1-4673-2160-0
Type
conf
DOI
10.1109/ISSA.2012.6320454
Filename
6320454
Link To Document