FAIR-Based Cyber Influence Damage Assessment for Exploit in Mobile Device

作者: Mookyu Park , Jaehyeok Han , Junwoo Seo , Haengrok Oh , Kyungho Lee

DOI: 10.1007/978-981-13-3732-1_4

关键词:

摘要: Recently, as the utilization rate for mobile devices has increased, cyber attacks targeting them have been increasing. Cyber such ransomware in general network space started to spread devices. In addition, malware that exploits vulnerabilities is also increasing rapidly. Threats these could cause negative damage human life. Thus, attack causes secondary real world called a Influence Attack. This paper presents an influence scenario which exploit of Android OS acquires permission device propagating false information. Based on this scenario, we analyze assessment can social well cyberspace assets through FAIR (Factor Analysis Information Risk) model.

参考文章(11)
Ruth E. Deacon, Francille M. Firebaugh, Family Resource Management : Principles and Applications ,(1981)
Trey Herr, PrEP: A Framework for Malware & Cyber Weapons Social Science Research Network. ,(2013) , 10.2139/SSRN.2343798
Michael R. Grimaila, Larry W. Fortson, Towards an Information Asset-Based Defensive Cyber Damage Assessment Process computational intelligence and security. pp. 206- 212 ,(2007) , 10.1109/CISDA.2007.368155
Shubhangi Daware, V. M. Thakare, Mobile Forensics: overview of digital forensic, computer forensics vs. mobile forensics and tools IJCA Proceedings on National Conference on Recent Trends in Computing. pp. 32- 35 ,(2012)
Christian J. D'Orazio, Rongxing Lu, Kim-Kwang Raymond Choo, Athanasios V. Vasilakos, A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps Applied Mathematics and Computation. ,vol. 293, pp. 523- 544 ,(2017) , 10.1016/J.AMC.2016.08.051
Jignesh Joshi, Chandresh Parekh, Android smartphone vulnerabilities: A survey international conference advances computing communication and automation. pp. 1- 5 ,(2016) , 10.1109/ICACCA.2016.7578857
I.B. Saenko, O.S. Lauta, I.V. Kotenko, Application of stochastic networks conversion technique for simulation of mobile banking attacks Izvestiâ vysših učebnyh zavedenij. Priborostroenie. pp. 928- 933 ,(2016) , 10.17586/0021-3454-2016-59-11-928-933
Faysal Hossain Shezan, Syeda Farzia Afroze, Anindya Iqbal, Vulnerability detection in recent Android apps: An empirical study 2017 International Conference on Networking, Systems and Security (NSysS). pp. 55- 63 ,(2017) , 10.1109/NSYSS.2017.7885802