Skip to main content

2017 | OriginalPaper | Buchkapitel

2. Mobile Device Security

verfasst von : Jesús Téllez, Sherali Zeadally

Erschienen in: Mobile Payment Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we review several mobile devices available on the market that allow users to support different applications’ requirements and needs. Next, we discuss popular operating systems for current consumer-type mobile devices. This chapter also highlights some important differences between mobile device security and Personal Computer (PC) security to improve the understanding of mobile device security. We identify various types of threats against mobile payment systems, the resources to be protected, attackers’ characteristics, and finally we present a threat model. This chapter also describe recent popular mobile malware types. We present two mechanisms that can be used to mitigate different types of threats for mobile devices such as smartphones.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
12.
Zurück zum Zitat M. Becher, F.C. Freiling, Towards dynamic malware analysis to increase mobile device security, in Sicherheit 2008 (2008), pp. 423–433 M. Becher, F.C. Freiling, Towards dynamic malware analysis to increase mobile device security, in Sicherheit 2008 (2008), pp. 423–433
16.
Zurück zum Zitat J. Bickford, R. O’Hare, A. Baliga, V. Ganapathy, L. Iftode, Rootkits on smart phones: attacks, implications and opportunities, in Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (HotMobile 2010) (2010), pp. 49–54 J. Bickford, R. O’Hare, A. Baliga, V. Ganapathy, L. Iftode, Rootkits on smart phones: attacks, implications and opportunities, in Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (HotMobile 2010) (2010), pp. 49–54
33.
Zurück zum Zitat G. Delac, M. Silic, J. Krolo, Emerging security threats for mobile platforms, in 34th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2011) (2011), pp. 1468–1473 G. Delac, M. Silic, J. Krolo, Emerging security threats for mobile platforms, in 34th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2011) (2011), pp. 1468–1473
39.
Zurück zum Zitat A.P. Felt, M. Finifter, E. Chin, S. Hanna, D. Wagner, A survey of mobile malware in the wild, in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011) (2011), pp. 3–14 A.P. Felt, M. Finifter, E. Chin, S. Hanna, D. Wagner, A survey of mobile malware in the wild, in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011) (2011), pp. 3–14
102.
Zurück zum Zitat Q. Li, G. Clark, Mobile security: a look ahead. IEEE Secur. Priv. 11(1), 78–81 (2013)CrossRef Q. Li, G. Clark, Mobile security: a look ahead. IEEE Secur. Priv. 11(1), 78–81 (2013)CrossRef
110.
Zurück zum Zitat R.R. Maddirala, Secure file transfers using mobile device. Master’s thesis, Department of Computer Engineering and Computer Science California State University, Long Beach (2010) R.R. Maddirala, Secure file transfers using mobile device. Master’s thesis, Department of Computer Engineering and Computer Science California State University, Long Beach (2010)
115.
Zurück zum Zitat K.N. McGill, Trusted mobile devices: requirements for a mobile trusted platform module. J. Hopkins Apl Tech. Dig. 32(2), 544–554 (2013) K.N. McGill, Trusted mobile devices: requirements for a mobile trusted platform module. J. Hopkins Apl Tech. Dig. 32(2), 544–554 (2013)
122.
Zurück zum Zitat C.R. Mulliner, Security of smart phones. Master’s thesis, University of California Santa Barbara (2006) C.R. Mulliner, Security of smart phones. Master’s thesis, University of California Santa Barbara (2006)
129.
Zurück zum Zitat M. Niranjanamurthy, N. Kavyashree, S. Jagannath, R. Bhargava, M-commerce: security challenges issues and recommended secure payment method. Int. J. Manag. IT Eng. 2(8), 374–393 (2012) M. Niranjanamurthy, N. Kavyashree, S. Jagannath, R. Bhargava, M-commerce: security challenges issues and recommended secure payment method. Int. J. Manag. IT Eng. 2(8), 374–393 (2012)
140.
Zurück zum Zitat H. Pieterse, M.S. Olivier, Security steps for smartphone users, in Information Security for South Africa (ISSA 2013) (2013), pp. 1–6 H. Pieterse, M.S. Olivier, Security steps for smartphone users, in Information Security for South Africa (ISSA 2013) (2013), pp. 1–6
142.
Zurück zum Zitat M.L. Polla, F. Martinelli, D. Sgandurra, A survey on security for mobile devices. IEEE Commun. Surv. Tutorials 15(1), 446–471 (2013)CrossRef M.L. Polla, F. Martinelli, D. Sgandurra, A survey on security for mobile devices. IEEE Commun. Surv. Tutorials 15(1), 446–471 (2013)CrossRef
170.
Zurück zum Zitat B. Sun, Y. Xiao, K. Wu, Intrusion detection in cellular mobile networks, in Wireless Network Security, ed. by Y. Xiao, X.S. Shen, D.-Z. Du (Springer, New York, 2007), pp. 183–210CrossRef B. Sun, Y. Xiao, K. Wu, Intrusion detection in cellular mobile networks, in Wireless Network Security, ed. by Y. Xiao, X.S. Shen, D.-Z. Du (Springer, New York, 2007), pp. 183–210CrossRef
176.
Zurück zum Zitat The National Institute of Standards and Technology (NIST), Guidelines on Hardware-Rooted Security in Mobile Devices (Draft), Special Publication 800-164, Oct 2012 The National Institute of Standards and Technology (NIST), Guidelines on Hardware-Rooted Security in Mobile Devices (Draft), Special Publication 800-164, Oct 2012
179.
Zurück zum Zitat S. Töyssy, M. Helenius, About malicious software in smartphones. J. Comput. Virol. 2(2), 109–119 (2006)CrossRef S. Töyssy, M. Helenius, About malicious software in smartphones. J. Comput. Virol. 2(2), 109–119 (2006)CrossRef
184.
Zurück zum Zitat J. Viega, B. Michael, Guest editors’ introduction: mobile device security. IEEE Secur. Priv. 8(2), 11–12 (2010)CrossRef J. Viega, B. Michael, Guest editors’ introduction: mobile device security. IEEE Secur. Priv. 8(2), 11–12 (2010)CrossRef
186.
Zurück zum Zitat S. Viveros, The economic impact of malicious code in wireless mobile networks, in 4th International Conference on (Conference Publication No. 494) 3G Mobile Communication Technologies (3G 2003) (2003), pp. 1–6 S. Viveros, The economic impact of malicious code in wireless mobile networks, in 4th International Conference on (Conference Publication No. 494) 3G Mobile Communication Technologies (3G 2003) (2003), pp. 1–6
198.
Zurück zum Zitat X. Zhang, O. Aciiçmez, J.-P. Seifert, Building efficient integrity measurement and attestation for mobile phone platforms, in Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, 3–5 June 2009, Revised selected papers, ed. by A.U. Schmidt, S. Lian. Volume 17 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Springer, Berlin/Heidelberg, 2009), pp. 71–82 X. Zhang, O. Aciiçmez, J.-P. Seifert, Building efficient integrity measurement and attestation for mobile phone platforms, in Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, 3–5 June 2009, Revised selected papers, ed. by A.U. Schmidt, S. Lian. Volume 17 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Springer, Berlin/Heidelberg, 2009), pp. 71–82
Metadaten
Titel
Mobile Device Security
verfasst von
Jesús Téllez
Sherali Zeadally
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-23033-7_2

Premium Partner