A Security Analysis of Smartphones [article]

Ishita Verma, IUPUI University Library, IUPUI # Defaults To Publisher, Brian King, Maher E. Rizkalla, Lee, Jaehwan (John)
2011
This work analyzes and discusses the current security environment of today's (and future) smartphones, and proposes a security model which will reduce smartphone vulnerabilities, preserving privacy, integrity and availability of smartphone native applications to authorized parties. For this purpose, we begin with an overlook of current smartphone security standards, and explore the threats, vulnerabilities and attacks on them, that have been uncovered so far with existing popular smartphones.
more » ... also look ahead at the future uses of the smartphones, and the security threats that these newer applications would introduce. We use this knowledge to construct a mathematical model, which gives way to policies that should be followed to secure the smartphone under the model. We finally discuss existing and proposed security mechanisms that can be incorporated in the smartphone architecture to meet the set policies, and thus the set security standards.
doi:10.7912/c2/2485 fatcat:mfu43mrsy5drlaoyp7gjvrbvu4