Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

被引:8
|
作者
Muhammad, Zia [1 ,2 ]
Anwar, Zahid [1 ,2 ]
Javed, Abdul Rehman [3 ]
Saleem, Bilal [4 ]
Abbas, Sidra [5 ]
Gadekallu, Thippa Reddy [3 ,6 ,7 ,8 ,9 ]
机构
[1] North Dakota State Univ, Dept Comp Sci, Fargo, ND USA
[2] North Dakota State Univ, Challey Inst, Fargo, ND USA
[3] Lebanese Amer Univ, Dept Elect & Comp Engn, 36-S-12, Byblos, Lebanon
[4] Air Univ, Dept Cybersecur, E-9, Islamabad 44000, Pakistan
[5] COMSATS Univ, Dept Comp Sci, Islamabad 44000, Pakistan
[6] Zhongda Grp, Jiaxing 314312, Peoples R China
[7] Vellore Inst Technol, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
[8] Jiaxing Univ, Coll Informat Sci & Engn, Jiaxing 314001, Peoples R China
[9] Lovely Profess Univ, Div Res & Dev, Phagwara 144411, India
关键词
smartphone security; security and privacy; android issues; malware attacks; APTs; vulnerabilities; sensor-based attacks; side-channel attacks; Google Play Store; Google Play Protect; mobile biometric attacks; static analysis; dynamic analysis; open challenges; STATIC ANALYSIS; ERROR-DETECTION; ANDROID APPS; AUTHENTICATION; COMMUNICATION; VULNERABILITY; DEVICES; THREATS;
D O I
10.3390/technologies11030076
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
There is an exponential rise in the use of smartphones in government and private institutions due to business dependencies such as communication, virtual meetings, and access to global information. These smartphones are an attractive target for cybercriminals and are one of the leading causes of cyber espionage and sabotage. A large number of sophisticated malware attacks as well as advanced persistent threats (APTs) have been launched on smartphone users. These attacks are becoming significantly more complex, sophisticated, persistent, and undetected for extended periods. Traditionally, devices are targeted by exploiting a vulnerability in the operating system (OS) or device sensors. Nevertheless, there is a rise in APTs, side-channel attacks, sensor-based attacks, and attacks launched through the Google Play Store. Previous research contributions have lacked contemporary threats, and some have proven ineffective against the latest variants of the mobile operating system. In this paper, we conducted an extensive survey of papers over the last 15 years (2009-2023), covering vulnerabilities, contemporary threats, and corresponding defenses. The research highlights APTs, classifies malware variants, defines how sensors are exploited, visualizes multiple ways that side-channel attacks are launched, and provides a comprehensive list of malware families that spread through the Google Play Store. In addition, the research provides details on threat defense solutions, such as malware detection tools and techniques presented in the last decade. Finally, it highlights open issues and identifies the research gap that needs to be addressed to meet the challenges of next-generation smartphones.
引用
收藏
页数:50
相关论文
共 50 条
  • [21] Machine Learning for PIN Side-Channel Attacks Based on Smartphone Motion Sensors
    Nerini, Matteo
    Favarelli, Elia
    Chiani, Marco
    IEEE ACCESS, 2023, 11 : 23008 - 23018
  • [22] Cache Side-channel Attacks and Defenses of the Sliding Window Algorithm in TEEs
    Kou, Zili
    Sinha, Sharad
    He, Wenjian
    Zhang, Wei
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [23] XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses
    Gulmezoglu, Berk
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 4039 - 4051
  • [24] Security Network On-Chip for Mitigating Side-Channel Attacks
    Kenarangi, Farid
    Partin-Vaisband, Inna
    2019 ACM/IEEE INTERNATIONAL WORKSHOP ON SYSTEM LEVEL INTERCONNECT PREDICTION (SLIP), 2019,
  • [25] DRM to Counter Side-Channel Attacks?
    Benadjila, Ryad
    Billet, Olivier
    Francfort, Stanislas
    DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 23 - 32
  • [26] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
  • [27] Side-Channel Attacks in a Real Scenario
    Tang, Ming
    Luo, Maixing
    Zhou, Junfeng
    Yang, Zhen
    Guo, Zhipeng
    Yan, Fei
    Liu, Liang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 586 - 598
  • [28] Side-Channel Attacks in a Real Scenario
    Ming Tang
    Maixing Luo
    Junfeng Zhou
    Zhen Yang
    Zhipeng Guo
    Fei Yan
    Liang Liu
    Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598
  • [29] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342
  • [30] Optimal Collision Side-Channel Attacks
    Glowacz, Cezary
    Grosso, Vincent
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 126 - 140