Full metadata record
DC FieldValueLanguage
dc.contributor.authorMulliner, Collin-
dc.date.accessioned2011-07-21T08:54:07Z-
dc.date.available2011-07-21T08:54:07Z-
dc.date.issued2011-07-21-
dc.identifier.urihttp://hdl.handle.net/2003/28936-
dc.identifier.urihttp://dx.doi.org/10.17877/DE290R-2022-
dc.description.abstractMobile and smartphone security is a fast moving field. New vulnerabilities and resulting attacks need to be detected and analyzed as fast as possible. Unfortunately the attacker side is always a step ahead. To catch both, vulnerabilities and attacks, we aim to apply the technique of honeypots to the area of smartphones. For regular computer systems this has been done on large scale by [HP]. Honeypots: A honeypot is computer system that is meant to be attacked in order to study the attacker's behavior during and after the attack. Honeypots have been created in many different flavors. From single computer to whole networks of fake machines - called honeynets. We determined multiple challenges while setting up a smartphone-honeypot: System Setup: How to build an actually smartphone honeypot system. From real devices to development-emulators and maybe complete simulation [P04]. This largely depends on the OS we want to run as a honeypot and on the communication types we want to support. Compared to regular computers we have additional hardware and software capabilities that need to be present or simulated. Monitoring: Monitoring the honeypot is one of the essential parts. The honeypot is only useful if we can exactly determine what the attacker is doing. Depending on the system setup monitoring can be highly complicated. Containment: After compromise of the honeypot we need to make sure that the attacker can not use the honeypot for carrying out attacks. Furthermore, the honeypot should not be abused for fraud such as premium SMS/calls. Visibility: To make the honeypot useful it needs to be visible for attackers. This can happen in many ways such as publishing the phone number, email address, instant messaging account name and a like in as many ways a possible. The honeypot then needs to inspect message content and and such to e.g. open links contained in them in order to get infected.en
dc.language.isoende
dc.relation.ispartofSPRING - SIDAR Graduierten-Workshop über Reaktive Sicherheit, 21.-22. März 2011, Bochum, Deutschlandde
dc.subject.ddc004-
dc.titleSmartphone Honeypotsen
dc.typeTextde
dc.type.publicationtypeconferenceObjectde
dcterms.accessRightsopen access-
Appears in Collections:Presentations

Files in This Item:
File Description SizeFormat 
10.pdfDNB1.01 MBAdobe PDFView/Open


This item is protected by original copyright



This item is protected by original copyright rightsstatements.org