Безопасность информационных технологий (Sep 2012)

Attacks on Mobile Phones that Use the Automatic Configuration Mechanism

  • A. G. Beltov,
  • I. Y. Zhukov,
  • D. M. Mikhailov,
  • A. V. Starikovskiy,
  • A. M. Tolstaya

Journal volume & issue
Vol. 19, no. 2S
pp. 22 – 25

Abstract

Read online

The authors analyze the attacks on mobile devices that use the mechanism of an automatic configuration OMA/OTA, whose aim is listening to the Internet traffic of subscribers and the intrusion of malicious software on the user’s device, and suggest ways to protect mobile phones against such attacks.

Keywords