Intercepting Mobile-ID SIM Toolkit Calls On Android
dc.contributor.advisor | Paršovs, Arnis, juhendaja | |
dc.contributor.author | Mander, Karl Erik | |
dc.contributor.other | Tartu Ülikool. Loodus- ja täppisteaduste valdkond | et |
dc.contributor.other | Tartu Ülikool. Arvutiteaduse instituut | et |
dc.date.accessioned | 2023-10-20T11:39:31Z | |
dc.date.available | 2023-10-20T11:39:31Z | |
dc.date.issued | 2023 | |
dc.description.abstract | This thesis investigates the security risk of intercepting Mobile-ID SIM Toolkit calls on Android. The investigation is done by modifying the Android operating system with malware. Through an in-depth analysis of the communication protocol between an Android phone and a SIM card, this study demonstrates that attackers who have gained access to the victim’s phone through illegitimate apps or other exploits with root privileges may be able to remotely control Mobile-ID operations by intercepting SIM card communications. From there on, the system could complete all Mobile-ID transactions surreptitiously and automatically. This thesis aimed to research the security architecture of Android OS concerning Mobile-ID and discuss possible options that a malware creator would have to implement to achieve SIM command intercepting capabilities. | et |
dc.identifier.uri | https://hdl.handle.net/10062/93646 | |
dc.language.iso | est | et |
dc.publisher | Tartu Ülikool | et |
dc.rights | openAccess | et |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | Mobiil-ID | et |
dc.subject | SMS | et |
dc.subject | SIM-kaart | et |
dc.subject | Malware | et |
dc.subject | Android | et |
dc.subject.other | bakalaureusetööd | et |
dc.subject.other | informaatika | et |
dc.subject.other | infotehnoloogia | et |
dc.subject.other | informatics | et |
dc.subject.other | infotechnology | et |
dc.title | Intercepting Mobile-ID SIM Toolkit Calls On Android | et |
dc.type | Thesis | et |