Hackers in Your Pocket: A Survey of Smartphone Security Across Platforms
نویسندگان
چکیده
In the past research on smart phone operating system security has been scattered over blog posts and other non-archival publications. Over the last 5 years with advent of Android, iOS and Windows Phone 7, an increasing amount of research has also been published in the academic sphere on individual security mechanisms of the three platfroms. However, for a non-expert it is hard to get an overview over this research area. In this paper, we close this gap and provide a structured easy to access overview on the security features and prior research of the three most popular smartphone platforms: Android, iOS, and Windows Phone 7. In particular, we discuss and compare how each of these platforms uses sandboxing and memory protection, provides code signing, protects service connections, provides application shop security, and handles permissions.
منابع مشابه
Wireless Fidelity Real Time Security System
This paper describes about how you can secure your Wireless Network from hackers about various threats to wireless networks, How hackers makes most use of it and what are the security steps one should take to avoid becoming victim of such attacks. There are plenty of opportunities to connect to public Wi-Fi hotspots when you're on the go these days. Coffee shops, hotels, restaurants and airport...
متن کاملDelegate the smartphone user? Security awareness in smartphone platforms
Smartphone users increasingly download and install third-party applications from official application repositories. Attackers may use this centralized application delivery architecture as a security and privacy attack vector. This risk increases since application vetting mechanisms are often not in place and the user is delegated to authorize which functionality and protected resources are acce...
متن کاملSecurity and Privacy Risks Awareness for Bring Your Own Device (BYOD) Paradigm
The growing trend of BYOD in the higher education institutions creates a new form of student learning pedagogy in which students are able to use the mobile devices for their academic purposes in anywhere and anytime. Security threat in the paradigm of BYOD creates a great opportunity for hackers or attackers to find new attacks or vulnerabilities that could possibly exploit the students’ mobile...
متن کاملA Survey on Security for Smartphone Device
The technological advancements in mobile connectivity services such as GPRS, GSM, 3G, 4G, Blue-tooth, WiMAX, and Wi-Fi made mobile phones a necessary component of our daily lives. Also, mobile phones have become smart which let the users perform routine tasks on the go. However, this rapid increase in technology and tremendous usage of the smartphones make them vulnerable to malware and other s...
متن کاملMobile Device Encryption Systems
The initially consumer oriented iOS and Android platforms, and the newly available Windows Phone 8 platform start to play an important role within business related areas. Within the business context, the devices are typically deployed via mobile device management (MDM) solutions, or within the bring-your-own-device (BYOD) context. In both scenarios, the security depends on many platform securit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012