A Survey on Security for Smartphone Device

被引:0
|
作者
Zaidi, Syed Farhan Alam [1 ]
Shah, Munam Ali [1 ]
Kamran, Muhammad [2 ]
Javaid, Qaisar [3 ]
Zhang, Sijing [4 ]
机构
[1] COMSATS Inst Informat Technol, Dept Comp Sci, Islamabad, Pakistan
[2] Univ Sindh, Dept Distance Continuing & Comp Educ, Hyderabad, Andhra Pradesh, Pakistan
[3] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[4] Univ Bedfordshire, Dept Comp Sci & Technol, Luton, Beds, England
关键词
Smartphone Security; Vulnerabilities; Attacks; Malware;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The technological advancements in mobile connectivity services such as GPRS, GSM, 3G, 4G, Blue-tooth, WiMAX, and Wi-Fi made mobile phones a necessary component of our daily lives. Also, mobile phones have become smart which let the users perform routine tasks on the go. However, this rapid increase in technology and tremendous usage of the smartphones make them vulnerable to malware and other security breaching attacks. This diverse range of mobile connectivity services, device software platforms, and standards make it critical to look at the holistic picture of the current developments in smartphone security research. In this paper, our contribution is twofold. Firstly, we review the threats, vulnerabilities, attacks and their solutions over the period of 2010-2015 with a special focus on smartphones. Attacks are categorized into two types, i.e., old attack and new attacks. With this categorization, we aim to provide an easy and concise view of different attacks and the possible solutions to improve smartphone security. Secondly, we critically analyze our findings and estimate the market growth of different operating systems for the smartphone in coming years. Furthermore, we estimate the malware growth and forecast the world in 2020.
引用
收藏
页码:206 / 219
页数:14
相关论文
共 50 条
  • [31] 'Security Device'
    Ludmerer, N
    NORTH AMERICAN REVIEW, 1998, 283 (3-4): : 38 - 38
  • [32] A Survey on Security and Privacy Challenges in Device Discovery for Next-Generation Systems
    Hayat, Omar
    Ngah, Razali
    Kaleem, Zeeshan
    Hashim, Siti Zaiton Mohd
    Rodrigues, Joel J. P. C.
    IEEE ACCESS, 2020, 8 : 84584 - 84603
  • [33] Tracing the Arc of Smartphone Application Security
    McDaniel, Patrick
    SDN-NFVSEC'17: PROCEEDINGS OF THE ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION, 2017, : 51 - 51
  • [34] Smartphone and mobile phone security for the clinician
    Barber, Harry
    BRITISH JOURNAL OF HOSPITAL MEDICINE, 2016, 77 (08) : 467 - 470
  • [35] Security and privacy of smartphone messaging applications
    Mueller, Robin
    Schrittwieser, Sebastian
    Fruehwirt, Peter
    Kieseberg, Peter
    Weippl, Edgar
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2015, 11 (02) : 132 - +
  • [36] Smartphone Security Awareness: Time to Act
    Al-Hadadi, Mubarak
    Al Shidhani, Ali
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN INFORMATION TECHNOLOGY (CTIT), 2013, : 166 - 171
  • [37] CONSUMERIZATION OF SMARTPHONE AND MAJOR SECURITY CONCERNS
    Nakarani, Parthkumar
    Vakil, Farok
    INTED2016: 10TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE, 2016, : 2695 - 2699
  • [38] Smartphone Security 'Taint' What It Used to Be
    Wallach, Dan
    COMMUNICATIONS OF THE ACM, 2014, 57 (03) : 98 - 98
  • [39] Attitudes to IT Security when Using a Smartphone
    Benenson, Zinaida
    Kroll-Peters, Olaf
    Krupp, Matthias
    2012 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2012, : 1179 - 1183
  • [40] Integrated ECC and Blowfish for Smartphone Security
    Patel, Payal
    Patel, Rajan
    Patel, Nimisha
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 210 - 216