TY - GEN
T1 - FAIR-Based cyber influence damage assessment for exploit in mobile device
AU - Park, Mookyu
AU - Han, Jaehyeok
AU - Seo, Junwoo
AU - Oh, Haengrok
AU - Lee, Kyungho
N1 - Funding Information:
Acknowledgment. This work was supported by Defense Acquisition Program Administration and Agency for Defense Development under the contract (UD060048AD).
PY - 2019
Y1 - 2019
N2 - Recently, as the utilization rate for mobile devices has increased, cyber attacks targeting them have been increasing. Cyber attacks such as ransomware in general network space have started to spread to mobile devices. In addition, malware that exploits mobile vulnerabilities is also increasing rapidly. Threats to these mobile devices could cause negative damage to human life. Thus, the cyber attack that causes secondary damage to the real world is called a Cyber Influence Attack. This paper presents an influence attack scenario in which the exploit of the Android OS acquires the permission of the mobile device for propagating false information. Based on this scenario, we analyze the damage assessment of mobile device exploit that can cause real social damage as well as damage to cyberspace assets through FAIR (Factor Analysis of Information Risk) model.
AB - Recently, as the utilization rate for mobile devices has increased, cyber attacks targeting them have been increasing. Cyber attacks such as ransomware in general network space have started to spread to mobile devices. In addition, malware that exploits mobile vulnerabilities is also increasing rapidly. Threats to these mobile devices could cause negative damage to human life. Thus, the cyber attack that causes secondary damage to the real world is called a Cyber Influence Attack. This paper presents an influence attack scenario in which the exploit of the Android OS acquires the permission of the mobile device for propagating false information. Based on this scenario, we analyze the damage assessment of mobile device exploit that can cause real social damage as well as damage to cyberspace assets through FAIR (Factor Analysis of Information Risk) model.
KW - Cyber influence attack
KW - Damage assessment
KW - Exploit
KW - FAIR (Factor Analysis of Information Risk)
UR - http://www.scopus.com/inward/record.url?scp=85059900301&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85059900301&partnerID=8YFLogxK
U2 - 10.1007/978-981-13-3732-1_4
DO - 10.1007/978-981-13-3732-1_4
M3 - Conference contribution
AN - SCOPUS:85059900301
SN - 9789811337314
T3 - Communications in Computer and Information Science
SP - 51
EP - 64
BT - Mobile Internet Security - 2nd International Symposium, MobiSec 2017, Revised Selected Papers
A2 - Sharma, Vishal
A2 - Chen, Hsing-Chung
A2 - You, Ilsun
A2 - Kotenko, Igor
PB - Springer Verlag
T2 - 2nd International Symposium on Mobile Internet Security, MobiSec 2017
Y2 - 19 October 2017 through 22 October 2017
ER -