Proceedings of the 2011 ACM Symposium on Applied Computing 2011
DOI: 10.1145/1982185.1982506
|View full text |Cite
|
Sign up to set email alerts
|

Software security aspects of Java-based mobile phones

Abstract: More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This not only applies to security-critical mobile applications such as m-banking or m-commerce applications. The end user's privacy may also be in danger or the operator may be the target of an attack. In this paper, we discuss security risks introduced by mobile phones considering the perspectives of the different parties involved in telec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…In today's mobile world, SMS and MMS are available on cell phones, cameras, music boxes, gaming platforms, and even wireless remote controls. For example, new applications can achieve security and control [24]. Security systems have been a very crucial problem for warning systems which may be carried out on a big scale [25,26].…”
Section: Sms Systemmentioning
confidence: 99%
“…In today's mobile world, SMS and MMS are available on cell phones, cameras, music boxes, gaming platforms, and even wireless remote controls. For example, new applications can achieve security and control [24]. Security systems have been a very crucial problem for warning systems which may be carried out on a big scale [25,26].…”
Section: Sms Systemmentioning
confidence: 99%
“…In embedded devices, such as mobile phones or ARM servers used for cloud computing, a malicious user may try to compromise the computer's [30] hypervisor [31,32] as also described in [33] for Xen or KVM [35] through a host privilege escalation. Min [34] claims that the best approach is to rely on the hardware and presents a security monitor as a solution.…”
Section: Protecting the Hypervisormentioning
confidence: 99%
“…The security aspects of mobile devices are another important research area with many research models in it [6] [7] [8] [9].…”
Section: Motivationsmentioning
confidence: 99%
“…The mobile phones have evolved from simple communication devices to responsible units which can handle mission critical applications [5]. The security aspects of mobile devices are another important research area with many research models in it [6]…”
Section: Motivationsmentioning
confidence: 99%