Skip to main navigation Skip to search Skip to main content

A systematic deconstruction of human-centric privacy & security threats on mobile phones

  • Habiba Farzand*
  • , Melvin Abraham
  • , Stephen Brewster
  • , Mohamed Khamis
  • , Karola Marky
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

11 Downloads (Pure)

Abstract

Mobile phones are most likely the subject of targeted attacks, such as software exploits. The resources needed to carry out such attacks are becoming increasingly available and, hence, easily executable, putting users’ privacy at risk. We conducted a systematic literature analysis to understand the relationship between resources and attack feasibility and present a categorisation of social engineering and side-channel attacks on mobile phones focusing on the resources attackers require. Our proposed categorisation levels facilitate an in-depth understanding of how mobile phone attacks can be executed using different combinations of partly simple resources. The analysis reveals that discrete protection mechanisms are insufficient to provide all-inclusive protection. The proposed categorisation assists in building novel solutions for safeguarding users’ privacy from diverse attacks by carefully considering the potential misuse of resources. We conclude by outlining future research directions highlighting the urgent need for a holistic user defense.
Original languageEnglish
Pages (from-to)1628-1651
Number of pages24
JournalInternational Journal of Human-Computer Interaction
Volume41
Issue number2
Early online date12 Jun 2024
DOIs
Publication statusPublished - 17 Jan 2025
Externally publishedYes

Keywords

  • Social engineering attacks
  • Side channel attacks
  • Human-centred attacks
  • Mobile devices

Fingerprint

Dive into the research topics of 'A systematic deconstruction of human-centric privacy & security threats on mobile phones'. Together they form a unique fingerprint.

Cite this