CFP last date
22 July 2024
Reseach Article

A Revealed Architecture of camera-based Attacks for Smartphones

by Arnold Mashud Abukari, Mohammed Amini, Francis Martinson
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 27
Year of Publication: 2023
Authors: Arnold Mashud Abukari, Mohammed Amini, Francis Martinson
10.5120/ijca2023923023

Arnold Mashud Abukari, Mohammed Amini, Francis Martinson . A Revealed Architecture of camera-based Attacks for Smartphones. International Journal of Computer Applications. 185, 27 ( Aug 2023), 45-49. DOI=10.5120/ijca2023923023

@article{ 10.5120/ijca2023923023,
author = { Arnold Mashud Abukari, Mohammed Amini, Francis Martinson },
title = { A Revealed Architecture of camera-based Attacks for Smartphones },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2023 },
volume = { 185 },
number = { 27 },
month = { Aug },
year = { 2023 },
issn = { 0975-8887 },
pages = { 45-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number27/32864-2023923023/ },
doi = { 10.5120/ijca2023923023 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:28:59.516243+05:30
%A Arnold Mashud Abukari
%A Mohammed Amini
%A Francis Martinson
%T A Revealed Architecture of camera-based Attacks for Smartphones
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 27
%P 45-49
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Smartphones have taken a center stage in the daily activities of individuals and organizations across the world. Despite the positive impacts smartphones come with, the use of smartphones also has serious cyber security implications on the users. One of the most common attacks on smartphones is the camera-based attack. This research paper presents a revealed architectural algorithm highlighting how the camera-based attack are carried out and which functions of the smartphones are being used to aid the attack process. This research work also gives an overview of the global smartphone use and it’s reported cyber attack. The generalized smartphone architecture and it’s vulnerabilities are also presented in this research paper.

References
  1. Laricchia, F. (2023, June 6). Smartphone Statistics: Adoption, Usage, and Market Share. Retrieved from https://www.statista.com/topics/840/smartphones/#topicOverview
  2. Ceci, L. (2023). Monthly cyber attacks on global mobile users worldwide 2020-2022. Retrieved from https://www.statista.com/statistics/1305965/mobile-users-cyber-attacks/
  3. Storm, D. (2014). New attacks secretly use smartphone cameras, speakers and microphones. Retrieved from https://www.computerworld.com/article/2598704/new-attacks-secretly-use-smartphone-cameras--speakers-and-microphones.html
  4. Fiebig, T., Krissler, J., & Hänsch, R. (2013). Security Impact of High Resolution Smartphone Cameras. Retrieved from https://www.usenix.org/system/files/conference/woot14/woot14-fiebig.pdf
  5. Khelif MA, Lorandel J, Romain O (2020) Hardware Man-in-the-Middle Attacks on Smartphones. Forensic Sci Today 6(1): 012-015. DOI: 10.17352/fst.000016
  6. Elibol F, Sarac U, Erer I (2012) Realistic eavesdropping attacks on computer displays with low-cost and mobile receiver system. In 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO) 1767-1771. Link: https://bit.ly/3cRRCwl
  7. Tehranipoor M, Wang C (2011) Introduction to hardware security and trust. Springer Science & Business Media. Link: https://bit.ly/3bCBlex
  8. Bailoo,A.S (2019). A Quick Introduction to Smartphone Architecture. Retrieved from https://evelta.com/blog/a-quick-introduction-to-smartphone-architecture/
  9. Research and Market. (2022). Global Smartphone Application Processor (AP) Market: Analysis By Operating System (Android, iOS, and Others), By Application (Camera, Gaming, Photo and Video Editing, and Others), By Region Size and Trends with Impact of COVID-19 and Forecast up to 2027. Retrieved from https://www.researchandmarkets.com/report/mobile-application-processor?utm_source=BW&utm_medium=PressRelease&utm_code=97h2th&utm_campaign=1776532+-+Insights+on+the+Smartphone+Application+Pr
  10. Wu, L., Du, X., Wang, L., Fu, X., Mbouna, R. O., & Kong, S. G. (2014). Analyzing mobile phone vulnerabilities caused by camera. In 2014 IEEE Global Communications Conference (pp. 4126-4130). Austin, TX, USA. doi: 10.1109/GLOCOM.2014.7037454.
Index Terms

Computer Science
Information Sciences

Keywords

Smartphone cyber attack camera vulnerabilities Architecture cybesecurity