2011 IEEE Symposium on Security and Privacy 2011
DOI: 10.1109/sp.2011.29
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
76
0
1

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 145 publications
(77 citation statements)
references
References 40 publications
0
76
0
1
Order By: Relevance
“…The applications in question are simply so small that the additional 922 bytes is significant, however it is extremely likely that the user is already downloading many other [24], larger applications further reducing any concerns of network performance degradation. Similarly, processor use directly affects battery life on mobile devices [11], and as such, excessive resource use could hinder adoption. Since devices already perform cryptographic signature verification the additional verification is not significantly different.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…The applications in question are simply so small that the additional 922 bytes is significant, however it is extremely likely that the user is already downloading many other [24], larger applications further reducing any concerns of network performance degradation. Similarly, processor use directly affects battery life on mobile devices [11], and as such, excessive resource use could hinder adoption. Since devices already perform cryptographic signature verification the additional verification is not significantly different.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Second, markets enforce policies to deal with malicious applications. Some markets (e.g., Apple AppStore) vet applications prior to publication [11]. Others, such as Google Play, allow relatively unmoderated publication, but react to identified malware by removing it both from the market and from all (connected) devices that have already installed the malicious application.…”
Section: Introductionmentioning
confidence: 99%
“…In this proposed system, opening and closing of a door is achieved by using an android application. [6] The owner can connect android application device to the system through GSM, which in term to connected to a microcontroller controlled door that can open/close the door by entering the password. This method is very convenient as one doesn't have to get down of his car to open/close the door physically.…”
Section: Design Implementationmentioning
confidence: 99%
“…Thus, the UE will be increasingly vulnerable to mobile malware targeting the stored personal and sensitive information, such as bank credentials, SMSs/MMSs, audio/video files, emails, contacts and GPS coordinates, that attackers can exploit and misuse for financial gain. The malicious software will gain unauthorized access to the stored end-user's information, collect it and forward it to the owner of the malware through all of the UE's communication channels (Becher, 2011;Arabo, 2013;Flo, 2009). …”
Section: Mobile Malware Attacks Targeting Uementioning
confidence: 99%
“…To achieve disruption, the installed malicious software can use all available CPU cycles for junk computations leading to huge power consumption that will rapidly cause the depletion of the UE's power source. This attack falls in the category of Denial of Service attacks against UE (Becher, 2011). However, the above attacks can be also executed by mobile botnets in order to target many mobile end-users at the same time and in an automated way.…”
Section: Mobile Malware Attacks Targeting Uementioning
confidence: 99%