FAIR-Based cyber influence damage assessment for exploit in mobile device

Mookyu Park, Jaehyeok Han, Junwoo Seo, Haengrok Oh, Kyung Ho Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Recently, as the utilization rate for mobile devices has increased, cyber attacks targeting them have been increasing. Cyber attacks such as ransomware in general network space have started to spread to mobile devices. In addition, malware that exploits mobile vulnerabilities is also increasing rapidly. Threats to these mobile devices could cause negative damage to human life. Thus, the cyber attack that causes secondary damage to the real world is called a Cyber Influence Attack. This paper presents an influence attack scenario in which the exploit of the Android OS acquires the permission of the mobile device for propagating false information. Based on this scenario, we analyze the damage assessment of mobile device exploit that can cause real social damage as well as damage to cyberspace assets through FAIR (Factor Analysis of Information Risk) model.

Original languageEnglish
Title of host publicationMobile Internet Security - 2nd International Symposium, MobiSec 2017, Revised Selected Papers
EditorsVishal Sharma, Hsing-Chung Chen, Ilsun You, Igor Kotenko
PublisherSpringer Verlag
Pages51-64
Number of pages14
ISBN (Print)9789811337314
DOIs
Publication statusPublished - 2019 Jan 1
Event2nd International Symposium on Mobile Internet Security, MobiSec 2017 - Jeju Island, Korea, Republic of
Duration: 2017 Oct 192017 Oct 22

Publication series

NameCommunications in Computer and Information Science
Volume971
ISSN (Print)1865-0929

Other

Other2nd International Symposium on Mobile Internet Security, MobiSec 2017
CountryKorea, Republic of
CityJeju Island
Period17/10/1917/10/22

Fingerprint

Damage Assessment
Factor analysis
Factor Analysis
Mobile devices
Mobile Devices
Attack
Damage
Scenarios
Malware
Vulnerability
Influence

Keywords

  • Cyber influence attack
  • Damage assessment
  • Exploit
  • FAIR (Factor Analysis of Information Risk)

ASJC Scopus subject areas

  • Computer Science(all)
  • Mathematics(all)

Cite this

Park, M., Han, J., Seo, J., Oh, H., & Lee, K. H. (2019). FAIR-Based cyber influence damage assessment for exploit in mobile device. In V. Sharma, H-C. Chen, I. You, & I. Kotenko (Eds.), Mobile Internet Security - 2nd International Symposium, MobiSec 2017, Revised Selected Papers (pp. 51-64). (Communications in Computer and Information Science; Vol. 971). Springer Verlag. https://doi.org/10.1007/978-981-13-3732-1_4

FAIR-Based cyber influence damage assessment for exploit in mobile device. / Park, Mookyu; Han, Jaehyeok; Seo, Junwoo; Oh, Haengrok; Lee, Kyung Ho.

Mobile Internet Security - 2nd International Symposium, MobiSec 2017, Revised Selected Papers. ed. / Vishal Sharma; Hsing-Chung Chen; Ilsun You; Igor Kotenko. Springer Verlag, 2019. p. 51-64 (Communications in Computer and Information Science; Vol. 971).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Park, M, Han, J, Seo, J, Oh, H & Lee, KH 2019, FAIR-Based cyber influence damage assessment for exploit in mobile device. in V Sharma, H-C Chen, I You & I Kotenko (eds), Mobile Internet Security - 2nd International Symposium, MobiSec 2017, Revised Selected Papers. Communications in Computer and Information Science, vol. 971, Springer Verlag, pp. 51-64, 2nd International Symposium on Mobile Internet Security, MobiSec 2017, Jeju Island, Korea, Republic of, 17/10/19. https://doi.org/10.1007/978-981-13-3732-1_4
Park M, Han J, Seo J, Oh H, Lee KH. FAIR-Based cyber influence damage assessment for exploit in mobile device. In Sharma V, Chen H-C, You I, Kotenko I, editors, Mobile Internet Security - 2nd International Symposium, MobiSec 2017, Revised Selected Papers. Springer Verlag. 2019. p. 51-64. (Communications in Computer and Information Science). https://doi.org/10.1007/978-981-13-3732-1_4
Park, Mookyu ; Han, Jaehyeok ; Seo, Junwoo ; Oh, Haengrok ; Lee, Kyung Ho. / FAIR-Based cyber influence damage assessment for exploit in mobile device. Mobile Internet Security - 2nd International Symposium, MobiSec 2017, Revised Selected Papers. editor / Vishal Sharma ; Hsing-Chung Chen ; Ilsun You ; Igor Kotenko. Springer Verlag, 2019. pp. 51-64 (Communications in Computer and Information Science).
@inproceedings{35d911cb2ea344be942538de41be9e17,
title = "FAIR-Based cyber influence damage assessment for exploit in mobile device",
abstract = "Recently, as the utilization rate for mobile devices has increased, cyber attacks targeting them have been increasing. Cyber attacks such as ransomware in general network space have started to spread to mobile devices. In addition, malware that exploits mobile vulnerabilities is also increasing rapidly. Threats to these mobile devices could cause negative damage to human life. Thus, the cyber attack that causes secondary damage to the real world is called a Cyber Influence Attack. This paper presents an influence attack scenario in which the exploit of the Android OS acquires the permission of the mobile device for propagating false information. Based on this scenario, we analyze the damage assessment of mobile device exploit that can cause real social damage as well as damage to cyberspace assets through FAIR (Factor Analysis of Information Risk) model.",
keywords = "Cyber influence attack, Damage assessment, Exploit, FAIR (Factor Analysis of Information Risk)",
author = "Mookyu Park and Jaehyeok Han and Junwoo Seo and Haengrok Oh and Lee, {Kyung Ho}",
year = "2019",
month = "1",
day = "1",
doi = "10.1007/978-981-13-3732-1_4",
language = "English",
isbn = "9789811337314",
series = "Communications in Computer and Information Science",
publisher = "Springer Verlag",
pages = "51--64",
editor = "Vishal Sharma and Hsing-Chung Chen and Ilsun You and Igor Kotenko",
booktitle = "Mobile Internet Security - 2nd International Symposium, MobiSec 2017, Revised Selected Papers",

}

TY - GEN

T1 - FAIR-Based cyber influence damage assessment for exploit in mobile device

AU - Park, Mookyu

AU - Han, Jaehyeok

AU - Seo, Junwoo

AU - Oh, Haengrok

AU - Lee, Kyung Ho

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Recently, as the utilization rate for mobile devices has increased, cyber attacks targeting them have been increasing. Cyber attacks such as ransomware in general network space have started to spread to mobile devices. In addition, malware that exploits mobile vulnerabilities is also increasing rapidly. Threats to these mobile devices could cause negative damage to human life. Thus, the cyber attack that causes secondary damage to the real world is called a Cyber Influence Attack. This paper presents an influence attack scenario in which the exploit of the Android OS acquires the permission of the mobile device for propagating false information. Based on this scenario, we analyze the damage assessment of mobile device exploit that can cause real social damage as well as damage to cyberspace assets through FAIR (Factor Analysis of Information Risk) model.

AB - Recently, as the utilization rate for mobile devices has increased, cyber attacks targeting them have been increasing. Cyber attacks such as ransomware in general network space have started to spread to mobile devices. In addition, malware that exploits mobile vulnerabilities is also increasing rapidly. Threats to these mobile devices could cause negative damage to human life. Thus, the cyber attack that causes secondary damage to the real world is called a Cyber Influence Attack. This paper presents an influence attack scenario in which the exploit of the Android OS acquires the permission of the mobile device for propagating false information. Based on this scenario, we analyze the damage assessment of mobile device exploit that can cause real social damage as well as damage to cyberspace assets through FAIR (Factor Analysis of Information Risk) model.

KW - Cyber influence attack

KW - Damage assessment

KW - Exploit

KW - FAIR (Factor Analysis of Information Risk)

UR - http://www.scopus.com/inward/record.url?scp=85059900301&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85059900301&partnerID=8YFLogxK

U2 - 10.1007/978-981-13-3732-1_4

DO - 10.1007/978-981-13-3732-1_4

M3 - Conference contribution

AN - SCOPUS:85059900301

SN - 9789811337314

T3 - Communications in Computer and Information Science

SP - 51

EP - 64

BT - Mobile Internet Security - 2nd International Symposium, MobiSec 2017, Revised Selected Papers

A2 - Sharma, Vishal

A2 - Chen, Hsing-Chung

A2 - You, Ilsun

A2 - Kotenko, Igor

PB - Springer Verlag

ER -