File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/SECCOMW.2006.359550
- Scopus: eid_2-s2.0-50049091842
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery
Title | Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery |
---|---|
Authors | |
Issue Date | 2006 |
Citation | 2006 Securecomm and Workshops, 2006, article no. 4198810 How to Cite? |
Abstract | As cellular data services and applications are being widely deployed, they become attractive targets for attackers, who could exploit unique vulnerabilities in cellular networks, mobile devices, and the interaction between cellular data networks and the Internet. In this paper, we demonstrate such an attack, which surreptitiously drains mobile devices' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bottleneck in mobile devices (the battery power) by exploiting an insecure cellular data service (MMS) and the insecure interaction between cellular data networks and the Internet (PDP context retention and the paging channel). The attack proceeds in two stages. In the first stage, the attacker compiles a hit list of mobile devices - including their cellular numbers, IP addresses, and model information -by exploiting MMS notification messages. In the second stage, the attacker drains mobile devices' battery power by sending periodical UDP packets and exploiting PDP context retention and the paging channel. This attack is unique not only because it exploits vulnerable cellular services to target mobile devices but also because the victim mobile users are unaware when their batteries are being drained. Furthermore, we identify two key vulnerable components in cellular networks and propose mitigation strategies for protecting cellular devices from such attacks from the Internet. ©2006 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/346543 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Racic, Radmilo | - |
dc.contributor.author | Ma, Denys | - |
dc.contributor.author | Chen, Hao | - |
dc.date.accessioned | 2024-09-17T04:11:37Z | - |
dc.date.available | 2024-09-17T04:11:37Z | - |
dc.date.issued | 2006 | - |
dc.identifier.citation | 2006 Securecomm and Workshops, 2006, article no. 4198810 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346543 | - |
dc.description.abstract | As cellular data services and applications are being widely deployed, they become attractive targets for attackers, who could exploit unique vulnerabilities in cellular networks, mobile devices, and the interaction between cellular data networks and the Internet. In this paper, we demonstrate such an attack, which surreptitiously drains mobile devices' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bottleneck in mobile devices (the battery power) by exploiting an insecure cellular data service (MMS) and the insecure interaction between cellular data networks and the Internet (PDP context retention and the paging channel). The attack proceeds in two stages. In the first stage, the attacker compiles a hit list of mobile devices - including their cellular numbers, IP addresses, and model information -by exploiting MMS notification messages. In the second stage, the attacker drains mobile devices' battery power by sending periodical UDP packets and exploiting PDP context retention and the paging channel. This attack is unique not only because it exploits vulnerable cellular services to target mobile devices but also because the victim mobile users are unaware when their batteries are being drained. Furthermore, we identify two key vulnerable components in cellular networks and propose mitigation strategies for protecting cellular devices from such attacks from the Internet. ©2006 IEEE. | - |
dc.language | eng | - |
dc.relation.ispartof | 2006 Securecomm and Workshops | - |
dc.title | Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/SECCOMW.2006.359550 | - |
dc.identifier.scopus | eid_2-s2.0-50049091842 | - |
dc.identifier.spage | article no. 4198810 | - |
dc.identifier.epage | article no. 4198810 | - |