Mobile OS Security and Threats: A Critical Review
نویسندگان
چکیده
The adoption of Smartphone’s in daily lives is transforming from simple communication to smart and the use of these multipurpose devices is rapidly increasing. The main reason for the increase in the Smartphone usage is their small size, their enhanced functionality and their ability to host many useful and attractive applications. However, this vast use of mobile platform makes these smart devices a soft target for security attacks and breach of privacy. The cases about the attacks on personal mobiles phones are on the rise which is a motivation for developing Smartphone application with better effective and efficient security measures to mitigate the impact of possible threats. This paper examines the feasibility of malware development in Smartphone platforms by average programmers that have access to the official tools and programming libraries provided by Smartphone platforms. In this paper comparison of Smartphones like Android, Blackberry, Apple iOS, Symbian, Window Mobile is given based on the specific evaluation criterions used for assessing the security level.
منابع مشابه
Mobile Security Threats and Issues -- A Broad Overview of Mobile Device Security
Mobile security draws more attention when mobile devices gain its popularity. Malware such as viruses, botnets, worms become a concern of using mobile devices since they leak sensitive information stored at or transmitted by mobile devices. This paper investigates malware in different platforms of mobile devices including Bluetooth, iPhone OS, and Blackberry. Countermeasures of vulnerability an...
متن کاملA Review and Analysis of the United States' Aggressive Intentions and Security Threats following the Islamic Revolution of Iran
Having reviewed and evaluated the aggressive intentions security threats in United States' behavior against the Islamic Republic of Iran, this article puts the greatest emphasis on aggressive intention especially "national security doctrine" and mentioning some of its characteristics so by categorizing different approaches toward national security clarify some of vague aspects of this concept. ...
متن کاملAssessment of Palm OS Susceptibility to Malicious Code Threats
The Palm OS operating system for Personal Digital Assistants (PDAs) and mobile phones has a weak security architecture, which introduces all sorts of security problems. This paper specifically targets the problem of malicious code. The main contribution of this work is the in-depth analysis of different vulnerabilities in Palm OS and the ways in which they can be exploited by malicious code. Fu...
متن کاملMobile Network Threat Analysis and MNO Positioning
The dramatic increase of smart mobile devices and applications, the advent of Android OS, the increased number of wireless radios (incl. NFC) the support and the low awareness about security and privacy risks on the one hand, and the flatter, IP-based network architecture, the introduction of new radio technologies (femtocells, WiFi, LTE) and applications (M2M, NFC) on the other, have changed t...
متن کاملAutomated Smartphone Security Configuration
Smartphones host operating systems that are on a par with modern desktop environments. For example, Google Android is a mobile operating system that is based upon a modified version of the Linux OS. Notwithstanding traditional threats to mobile phones, threats to desktop environments are also applicable to smartphones. Management of security configurations for the end-user has, to date, been co...
متن کامل