The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels

Seungjoon Lee, Youngmok Ha, Sungjun Yoon, Hyunju Jo, Soohee Jang, Jiyeon Lee, Youngan Kim, Ji Won Yoon

Research output: Contribution to journalArticle

Abstract

As employees bring mobile devices into the workplace, many companies have been encouraging their use for business purposes. As a result, data leakage accidents have been increasing, which can weaken companies’ competitiveness and can even threaten their survival. Therefore, many companies have recently adopted data leakage/loss prevention (DLP) solutions to avoid such leakages. However, these solutions and their study are limited to dedicated data channels such as SMS/MMS, HSPA and WIFI, but other types of channels, such as, voice call channels can be used to bypass and inactivate the DLP. In this paper, our attack model focuses on the malicious use of digital communication over these voice call channels by showing the possibility to deliver the text files, pictures and malicious codes. Furthermore, we also use post processing such as spell checking and image restoration for the maximum effectiveness of our attack scenario. Overall, we show the feasibility of voice call channels as new malicious attack channels.

Original languageEnglish
Pages (from-to)1-28
Number of pages28
JournalWireless Personal Communications
DOIs
Publication statusAccepted/In press - 2017 May 25

Fingerprint

Conveying
Loss prevention
Leakage (fluid)
Industry
Image reconstruction
Mobile devices
Accidents
Personnel
Communication
Processing

Keywords

  • Data leakage prevention
  • Malware
  • Mobile voice call

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering

Cite this

The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels. / Lee, Seungjoon; Ha, Youngmok; Yoon, Sungjun; Jo, Hyunju; Jang, Soohee; Lee, Jiyeon; Kim, Youngan; Yoon, Ji Won.

In: Wireless Personal Communications, 25.05.2017, p. 1-28.

Research output: Contribution to journalArticle

Lee, Seungjoon ; Ha, Youngmok ; Yoon, Sungjun ; Jo, Hyunju ; Jang, Soohee ; Lee, Jiyeon ; Kim, Youngan ; Yoon, Ji Won. / The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels. In: Wireless Personal Communications. 2017 ; pp. 1-28.
@article{64646cae4f7c4d1cb530b48b86ee8f08,
title = "The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels",
abstract = "As employees bring mobile devices into the workplace, many companies have been encouraging their use for business purposes. As a result, data leakage accidents have been increasing, which can weaken companies’ competitiveness and can even threaten their survival. Therefore, many companies have recently adopted data leakage/loss prevention (DLP) solutions to avoid such leakages. However, these solutions and their study are limited to dedicated data channels such as SMS/MMS, HSPA and WIFI, but other types of channels, such as, voice call channels can be used to bypass and inactivate the DLP. In this paper, our attack model focuses on the malicious use of digital communication over these voice call channels by showing the possibility to deliver the text files, pictures and malicious codes. Furthermore, we also use post processing such as spell checking and image restoration for the maximum effectiveness of our attack scenario. Overall, we show the feasibility of voice call channels as new malicious attack channels.",
keywords = "Data leakage prevention, Malware, Mobile voice call",
author = "Seungjoon Lee and Youngmok Ha and Sungjun Yoon and Hyunju Jo and Soohee Jang and Jiyeon Lee and Youngan Kim and Yoon, {Ji Won}",
year = "2017",
month = "5",
day = "25",
doi = "10.1007/s11277-017-4229-9",
language = "English",
pages = "1--28",
journal = "Wireless Personal Communications",
issn = "0929-6212",
publisher = "Springer Netherlands",

}

TY - JOUR

T1 - The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels

AU - Lee, Seungjoon

AU - Ha, Youngmok

AU - Yoon, Sungjun

AU - Jo, Hyunju

AU - Jang, Soohee

AU - Lee, Jiyeon

AU - Kim, Youngan

AU - Yoon, Ji Won

PY - 2017/5/25

Y1 - 2017/5/25

N2 - As employees bring mobile devices into the workplace, many companies have been encouraging their use for business purposes. As a result, data leakage accidents have been increasing, which can weaken companies’ competitiveness and can even threaten their survival. Therefore, many companies have recently adopted data leakage/loss prevention (DLP) solutions to avoid such leakages. However, these solutions and their study are limited to dedicated data channels such as SMS/MMS, HSPA and WIFI, but other types of channels, such as, voice call channels can be used to bypass and inactivate the DLP. In this paper, our attack model focuses on the malicious use of digital communication over these voice call channels by showing the possibility to deliver the text files, pictures and malicious codes. Furthermore, we also use post processing such as spell checking and image restoration for the maximum effectiveness of our attack scenario. Overall, we show the feasibility of voice call channels as new malicious attack channels.

AB - As employees bring mobile devices into the workplace, many companies have been encouraging their use for business purposes. As a result, data leakage accidents have been increasing, which can weaken companies’ competitiveness and can even threaten their survival. Therefore, many companies have recently adopted data leakage/loss prevention (DLP) solutions to avoid such leakages. However, these solutions and their study are limited to dedicated data channels such as SMS/MMS, HSPA and WIFI, but other types of channels, such as, voice call channels can be used to bypass and inactivate the DLP. In this paper, our attack model focuses on the malicious use of digital communication over these voice call channels by showing the possibility to deliver the text files, pictures and malicious codes. Furthermore, we also use post processing such as spell checking and image restoration for the maximum effectiveness of our attack scenario. Overall, we show the feasibility of voice call channels as new malicious attack channels.

KW - Data leakage prevention

KW - Malware

KW - Mobile voice call

UR - http://www.scopus.com/inward/record.url?scp=85019736029&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85019736029&partnerID=8YFLogxK

U2 - 10.1007/s11277-017-4229-9

DO - 10.1007/s11277-017-4229-9

M3 - Article

AN - SCOPUS:85019736029

SP - 1

EP - 28

JO - Wireless Personal Communications

JF - Wireless Personal Communications

SN - 0929-6212

ER -