skip to main content
10.1145/2046614acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
SPSM '11: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
ACM2011 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS'11: the ACM Conference on Computer and Communications Security Chicago Illinois USA 17 October 2011
ISBN:
978-1-4503-1000-0
Published:
17 October 2011
Sponsors:
Next Conference
October 14 - 18, 2024
Salt Lake City , UT , USA
Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the First ACM Workshop on Security and Privacy in Smartphones and Mobile Devices -- SPSM'11, held in association with the 18th ACM Conference on Computer and Communications Security, October 17th, 2011 in Chicago, Illinois (USA).

The workshop was created to organize and foster discussion of security in the emerging area of smartphone and mobile device computing. As organizers of top security venues, we've observed an increasing number of submissions describing novel approaches to solving the challenges of this area. We hope that this workshop will provide a dedicated venue to discuss these challenges and promising approaches for future research directions.

The call for papers attracted 19 submissions from Canada, Europe, and the United States. The program committee accepted 9 papers that cover a variety of topics, including malware, application isolation, permission models, and the interaction of smartphones and the real world. We are especially pleased to have a keynote speech by Gustavo de los Reyes, an Executive Director of Technology Security at AT&T, on The Network as Mobility Security Platform. We hope that these proceedings will serve as a valuable reference for security researchers and developers.

Skip Table Of Content Section
SESSION: Keynote address
keynote
The network as a mobility security platform

The network can be a powerful platform at the core of an advanced mobility security architecture. There are several unique benefits of using the network to provide security. Virtually all traffic - good and bad - traverses the network. Also, the network ...

SESSION: Malware
research-article
A survey of mobile malware in the wild

Mobile malware is rapidly becoming a serious threat. In this paper, we survey the current state of mobile malware in the wild. We analyze the incentives behind 46 pieces of iOS, Android, and Symbian malware that spread in the wild from 2009 to 2011. We ...

research-article
Crowdroid: behavior-based malware detection system for Android

The sharp increase in the number of smartphones on the market, with the Android platform posed to becoming a market leader makes the need for malware analysis on this platform an urgent issue.

In this paper we capitalize on earlier approaches for ...

research-article
Location based power analysis to detect malicious code in smartphones

This paper proposes to exploit correlation between a user's location and power consumption pattern of his/her smartphone to detect the presence of malicious code in the smartphone. Based on the observation that user location plays an important role in ...

SESSION: Isolating applications
research-article
Delivering secure applications on commercial mobile devices: the case for bare metal hypervisors

A problem faced by security sensitive mobile applications is assurance of correct execution on a commercial device. Prior approaches typically address this problem by assuming a trusted operating system (OS) as part of their trusted computing base (TCB)...

research-article
L4Android: a generic operating system framework for secure smartphones

Smartphones became many people's primary means of communication. Emerging applications such as Near Field Communication require new levels of security that cannot be enforced by current smartphone operating systems. Therefore vendors resort to hardware ...

research-article
Practical and lightweight domain isolation on Android

In this paper, we introduce a security framework for practical and lightweight domain isolation on Android to mitigate unauthorized data access and communication among applications of different trust levels (e.g., private and corporate). We present the ...

SESSION: Potpourri
short-paper
Short paper: a look at smartphone permission models

Many smartphone operating systems implement strong sandboxing for 3rd party application software. As part of this sandboxing, they feature a permission system, which conveys to users what sensitive resources an application will access and allows users ...

short-paper
Short paper: can your phone trust your friend selection?

In ad hoc communication, data packets are relayed over several hops before reaching their destination. Spontaneous communication requires that nodes trust each other as communication can be intentionally disturbed or privacy compromised by the ...

short-paper
Securing electronic medical records using attribute-based encryption on mobile devices

We provide a design and implementation of self-protecting electronic medical records (EMRs) using attribute-based encryption on mobile devices. Our system allows healthcare organizations to export EMRs to locations outside of their trust boundary. In ...

PANEL SESSION: Panel
panel
Security implications of Android: a closed system, open software mobile platform

Smartphones blur the boundaries between the traditional feature phone and a general purpose computer such as a laptop. The Android OS, from Google, was created to be an open alternative to fully closed platforms such as Apple's iOS or Microsoft's ...

Contributors
  • Arizona State University
  • Arizona State University
  • NC State University

Recommendations

Acceptance Rates

Overall Acceptance Rate46of139submissions,33%
YearSubmittedAcceptedRate
SPSM '16311342%
SPSM '1525936%
SPSM '14291138%
SPSM '13541324%
Overall1394633%