Spyware, defined as “monitoring programs surreptitiously installed on computers (…) [which] serve to record and transmit a user’s computer uses and behaviors to third parties” (Stafford, 2004), represents an ever-increasing and significant threat for anyone, and especially for smartphone users. The emergence of mobile spyware marks the rise of a sophisticated and ever-evolving breed of spyware meticulously designed to capitalize on the distinctive attributes of mobile operating systems and applications. Mobile spyware poses unique challenges and threats, since it exploits the ubiquitous connectivity, advanced sensor functionalities, and extensive repositories of personal data housed within mobile devices, rendering it a formidable adversary capable of surreptitiously surveilling and extracting sensitive information from compromised devices. In this paper, we delve into the role of cybersecurity and digital forensics research in tackling the challenges posed by mobile spyware, we explore the current state of practices, and we outline future research directions.

Guarding Digital Frontiers: Cybersecurity and Digital Forensics Research against Mobile Spyware Threats

Cosimo Anglano
2024-01-01

Abstract

Spyware, defined as “monitoring programs surreptitiously installed on computers (…) [which] serve to record and transmit a user’s computer uses and behaviors to third parties” (Stafford, 2004), represents an ever-increasing and significant threat for anyone, and especially for smartphone users. The emergence of mobile spyware marks the rise of a sophisticated and ever-evolving breed of spyware meticulously designed to capitalize on the distinctive attributes of mobile operating systems and applications. Mobile spyware poses unique challenges and threats, since it exploits the ubiquitous connectivity, advanced sensor functionalities, and extensive repositories of personal data housed within mobile devices, rendering it a formidable adversary capable of surreptitiously surveilling and extracting sensitive information from compromised devices. In this paper, we delve into the role of cybersecurity and digital forensics research in tackling the challenges posed by mobile spyware, we explore the current state of practices, and we outline future research directions.
File in questo prodotto:
File Dimensione Formato  
02. ESTRATTO_SAGGIO_COSIMO_ANGLANO.pdf

file disponibile agli utenti autorizzati

Licenza: Copyright dell'editore
Dimensione 7 MB
Formato Adobe PDF
7 MB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11579/186502
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact