Show simple item record

dc.contributor.advisorΞενάκης, Χρήστος
dc.contributor.authorΚαπετανάκης, Νικόλαος
dc.date.accessioned2016-06-21T07:02:55Z
dc.date.available2016-06-21T07:02:55Z
dc.date.issued2015-09
dc.identifier.urihttps://dione.lib.unipi.gr/xmlui/handle/unipi/8835
dc.format.extent77el
dc.language.isoenel
dc.publisherΠανεπιστήμιο Πειραιώςel
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Διεθνές*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectMobile communication systemsel
dc.subjectMobile computing -- Security measuresel
dc.titleStudy, analysis, implement and testing of malware mobile station (mal-MS) using a clone Sim card, an Arduino, AT commands and Qualcomm applications (QXDM, QPST)el
dc.typeMaster Thesisel
dc.contributor.departmentΣχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών. Τμήμα Ψηφιακών Συστημάτωνel
dc.description.abstractENWhen considering security in mobile systems, in common with most other systems, our purpose is in preventing: - Access and use of service to avoid or reduce a legitimate charge. - Loss of confidentiality or integrity of a user’s or operator’s data. - Denial of a specific user’s access to their service or denial of access by all users to a service. However, user expectations for instant communication and ease of use, as well as terminals which are easily lost or stolen, present a number of unique challenges in the mobile environment. Second generation systems such as GSM were designed from the beginning with security in mind. This has stood up to the kind of attacks that were prevalent on the analogue system at the time, thanks mainly to the ability to put responsibility for security in the hands of the Home Environment (HE) operator. The HE operator can control the use of the system by the provision of the Subscriber Identity Module (SIM) which contains a user identity and authentication key. This is specifically arranged so that this long life authentication key is not required by the Serving Network (SN) when roaming, exposed over the air or exposed across the interface between the SIM and the mobile. This keeps to the minimum the level of trust the HE operator needs to place in the User, Serving Network and manufacturer of the Mobile Equipment (ME). It is worth to mention that mobile security or mobile phone security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal information now stored on smartphones. More and more users and businesses use smartphones as communication tools but also as a means of planning and organizing their work and private life. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company. All smartphones, as computers, are preferred targets of attacks. These attacks exploit weaknesses related to smartphones that can come from means of communication like Calls, SMS, MMS, Wi-Fi networks, GSM, 3G etc… The study, analysis, implement and testing of malware mobile station (mal-MS) using clone Sim card, Arduino, AT commands and Qualcomm applications (QXDM, QPST) constitute the subject of present Thesis.el
dc.contributor.masterΤεχνοοικονομική Διοίκηση και Ασφάλεια Ψηφιακών Συστημάτωνel
dc.subject.keywordMobile devicesel
dc.subject.keywordMobile SIM cardsel


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές
Except where otherwise noted, this item's license is described as
Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές

Βιβλιοθήκη Πανεπιστημίου Πειραιώς
Contact Us
Send Feedback
Created by ELiDOC
Η δημιουργία κι ο εμπλουτισμός του Ιδρυματικού Αποθετηρίου "Διώνη", έγιναν στο πλαίσιο του Έργου «Υπηρεσία Ιδρυματικού Αποθετηρίου και Ψηφιακής Βιβλιοθήκης» της πράξης «Ψηφιακές υπηρεσίες ανοιχτής πρόσβασης της βιβλιοθήκης του Πανεπιστημίου Πειραιώς»