2013
DOI: 10.2200/s00555ed1v01y201312spt009
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Platform Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 35 publications
0
10
0
Order By: Relevance
“…Meanwhile, web based applications were supported by some of the most popular mobile platforms such as Windows Phone 8, iOS, and Black Berry 10 [1], Mobile Web browser applications are facing the same security threats on Web View Technology like computers in terms of having all the vulnerabilities [29]. ‗Application layer', Middleware layer' and ‗Kernel layer' are vital extension layers that have been recommended against privacy and security issues within different mobile platforms [1]. In addition, differences within mobile platforms for instance the security architectures are based on a similar model; Permission-based access control, code signing, and application isolation are the three fundamental built security techniques within various mobile platforms [1].…”
Section: The Rational Behind Securing Mobile Application Platformsmentioning
confidence: 99%
See 3 more Smart Citations
“…Meanwhile, web based applications were supported by some of the most popular mobile platforms such as Windows Phone 8, iOS, and Black Berry 10 [1], Mobile Web browser applications are facing the same security threats on Web View Technology like computers in terms of having all the vulnerabilities [29]. ‗Application layer', Middleware layer' and ‗Kernel layer' are vital extension layers that have been recommended against privacy and security issues within different mobile platforms [1]. In addition, differences within mobile platforms for instance the security architectures are based on a similar model; Permission-based access control, code signing, and application isolation are the three fundamental built security techniques within various mobile platforms [1].…”
Section: The Rational Behind Securing Mobile Application Platformsmentioning
confidence: 99%
“…‗Application layer', Middleware layer' and ‗Kernel layer' are vital extension layers that have been recommended against privacy and security issues within different mobile platforms [1]. In addition, differences within mobile platforms for instance the security architectures are based on a similar model; Permission-based access control, code signing, and application isolation are the three fundamental built security techniques within various mobile platforms [1].…”
Section: The Rational Behind Securing Mobile Application Platformsmentioning
confidence: 99%
See 2 more Smart Citations
“…In fact, most Android device manufacturers do not implement a secure boot, and intentionally allow a custom operating system to be loaded. 10 CyanogenMod is one of the most famous customized mobile operating systems derived from Android. Tutorials and materials for rooting Android devices are publicly available.…”
Section: Boot Integrity: Platform Uses On-die Rom II or One-time Progmentioning
confidence: 99%