2010
DOI: 10.1002/sec.218
|View full text |Cite
|
Sign up to set email alerts
|

From mobile phones to responsible devices

Abstract: Mobile phones have evolved from simple voice terminals into highly-capable, general-purpose computing platforms. While people are becoming increasingly more dependent on such devices to perform sensitive operations, protect secret data, and be available for emergency use, it is clear that phone operating systems are not ready to become mission-critical systems. Through a pair of vulnerabilities and a simulated attack on a cellular network, we demonstrate that there are a myriad of unmanaged mechanisms on mobil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 8 publications
(10 reference statements)
0
14
0
Order By: Relevance
“…Thereupon, by granting these permissions, users deliberately circumvent some of the access control mechanisms of their smartphones and become dependent on the good will or on the malicious intentions of developers, which may prove harmful. Similar concerns over the malicious potential of mobile phones were raised by [13].…”
Section: Introductionmentioning
confidence: 79%
“…Thereupon, by granting these permissions, users deliberately circumvent some of the access control mechanisms of their smartphones and become dependent on the good will or on the malicious intentions of developers, which may prove harmful. Similar concerns over the malicious potential of mobile phones were raised by [13].…”
Section: Introductionmentioning
confidence: 79%
“…Traynor et al summarize in [28] the lack of security features on mobile and smartphones and discuss possible solutions. Part of their work presents SELinux [18] as means of access control of system resources.…”
Section: Related Workmentioning
confidence: 99%
“…There exist works concerning vulnerabilities of mobile phones [19,25,30,31]. Some vulnerabilities are caused by the interaction between mobile devices, the Internet, and telecommunications networks [31].…”
Section: Related Workmentioning
confidence: 99%
“…Up to now, however, end users do not seem to be prepared for attacks on mobile phones, although some reports on hacking mobile phones already exist, e.g., [19,25,30]. In the future, it can be expected that the rate of security incidents will rise because of the increasing attractiveness of the attack target "mobile phone" [10].…”
Section: Introductionmentioning
confidence: 99%