Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Seungjoon-
dc.contributor.authorHa, Youngmok-
dc.contributor.authorYoon, Sungjun-
dc.contributor.authorJo, Hyunju-
dc.contributor.authorJang, Soohee-
dc.contributor.authorLee, Jiyeon-
dc.contributor.authorKim, Youngan-
dc.contributor.authorYoon, Ji Won-
dc.date.accessioned2021-09-03T02:16:27Z-
dc.date.available2021-09-03T02:16:27Z-
dc.date.created2021-06-16-
dc.date.issued2017-09-
dc.identifier.issn0929-6212-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/82375-
dc.description.abstractAs employees bring mobile devices into the workplace, many companies have been encouraging their use for business purposes. As a result, data leakage accidents have been increasing, which can weaken companies' competitiveness and can even threaten their survival. Therefore, many companies have recently adopted data leakage/loss prevention (DLP) solutions to avoid such leakages. However, these solutions and their study are limited to dedicated data channels such as SMS/MMS, HSPA and WIFI, but other types of channels, such as, voice call channels can be used to bypass and inactivate the DLP. In this paper, our attack model focuses on the malicious use of digital communication over these voice call channels by showing the possibility to deliver the text files, pictures and malicious codes. Furthermore, we also use post processing such as spell checking and image restoration for the maximum effectiveness of our attack scenario. Overall, we show the feasibility of voice call channels as new malicious attack channels.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.titleThe Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels-
dc.typeArticle-
dc.contributor.affiliatedAuthorYoon, Ji Won-
dc.identifier.doi10.1007/s11277-017-4229-9-
dc.identifier.scopusid2-s2.0-85019736029-
dc.identifier.wosid000408123600066-
dc.identifier.bibliographicCitationWIRELESS PERSONAL COMMUNICATIONS, v.96, no.1, pp.1145 - 1172-
dc.relation.isPartOfWIRELESS PERSONAL COMMUNICATIONS-
dc.citation.titleWIRELESS PERSONAL COMMUNICATIONS-
dc.citation.volume96-
dc.citation.number1-
dc.citation.startPage1145-
dc.citation.endPage1172-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorData leakage prevention-
dc.subject.keywordAuthorMobile voice call-
dc.subject.keywordAuthorMalware-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Yoon, Ji Won photo

Yoon, Ji Won
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE