loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Alexios Mylonas ; Stelios Dritsas ; Bill Tsoumas and Dimitris Gritzalis

Affiliation: Athens University of Economics & Business (AUEB), Greece

ISBN: 978-989-8425-71-3

ISSN: 2184-2825

Keyword(s): Smartphone, Security, Malware, Attack, Evaluation criteria.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Security and Privacy in Mobile Systems

Abstract: The adoption of smartphones, devices transforming from simple communication devices to ‘smart’ and multipurpose devices, is constantly increasing. Amongst the main reasons are their small size, their en¬hanced functionality and their ability to host many useful and attractive applications. However, this vast use of mobile platforms makes them an attractive target for conducting privacy and security attacks. This sce¬na¬rio increases the risk introduced by these attacks for personal mobile devices, given that the use of smar¬t¬phones as business tools may extend the perimeter of an organization’s IT infrastructure. Furthermore, smart¬¬phone platforms provide application developers with rich capabilities, which can be used to compro¬mi¬¬se the security and privacy of the device holder and her environment (private and/or organizational). This paper examines the feasibility of malware development in smartphone platforms by average programmers that have access to the official tools and pro gramming libraries provided by smartphone platforms. Towards this direction in this paper we initially propose specific evaluation criteria assessing the security level of the well-known smartphone platforms (i.e. Android, BlackBerry, Apple iOS, Symbian, Windows Mobile), in terms of the development of malware. In the sequel, we provide a comparative analysis, based on a proof of concept study, in which the implementation and distribution of a location tracking malware is attempted. Our study has proven that, under circumstances, all smartphone platforms could be used by average de¬ve¬lo¬pers as privacy attack vectors, harvesting data from the device without the users knowledge and consent. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 35.172.165.53

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Mylonas, A.; Dritsas, S.; Tsoumas, B. and Gritzalis, D. (2011). SMARTPHONE SECURITY EVALUATION - The Malware Attack Case.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, ISSN 2184-2825, pages 25-36. DOI: 10.5220/0003446800250036

@conference{secrypt11,
author={Alexios Mylonas. and Stelios Dritsas. and Bill Tsoumas. and Dimitris Gritzalis.},
title={SMARTPHONE SECURITY EVALUATION - The Malware Attack Case},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={25-36},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003446800250036},
isbn={978-989-8425-71-3},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - SMARTPHONE SECURITY EVALUATION - The Malware Attack Case
SN - 978-989-8425-71-3
AU - Mylonas, A.
AU - Dritsas, S.
AU - Tsoumas, B.
AU - Gritzalis, D.
PY - 2011
SP - 25
EP - 36
DO - 10.5220/0003446800250036

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.