The Community for Technology Leaders
RSS Icon
Issue No.12 - Dec. (2012 vol.45)
pp: 52-58
Yong Wang , Dakota State University
Kevin Streff , Dakota State University
Sonell Raman , Dakota State University
Because of their unique characteristics, smartphones present challenges requiring new business models that offer countermeasures to help ensure their security.
Smart phones, Malware, Mobile communication, Digital forensics, Batteries, Forensics, mobile forensics, smartphones, security, threats, attacks
Yong Wang, Kevin Streff, Sonell Raman, "Smartphone Security Challenges", Computer, vol.45, no. 12, pp. 52-58, Dec. 2012, doi:10.1109/MC.2012.288
1. IDC, “Mobile Phone Market Grows 17.9% in Fourth Quarter, According to IDC,” press release, 28 Jan. 2011; .
2. IDC, “Smartphones Outstrip Feature Phones for First Time in Western Europe as Android Sees Strong Growth in 2Q11, Says IDC,” press release, 9 Sept. 2011; www.idc.comgetdoc.jsp?containerId=prUK23024911 .
3. Nielsen, “In US, Smartphones Now Majority of New Cellphone Purchases,” blog, 30 June 2011; in-us-smartphones-now-majority-of-new-cellphone-purchases .
4. ITU, “Key Global Telecom Indicators for the World Telecommunication Service Sector,” Nov. 2011; KeyTelecom.html.
5. IDC, “Worldwide Smartphone Market Expected to Grow 55% in 2011 and Approach Shipments of One Billion in 2015,” June 2011; www.idc.comgetdoc.jsp?containerID=prUS22871611 .
6. N. Leavitt, “Mobile Security: Finally a Serious Problem?”, Computer, June 2011, pp. 11-14.
7. W. Jeon et al., “A Practical Analysis of Smartphone Security,” Proc. Int'l Conf. Human Interface and the Management of Information—Part I, Springer-Verlag, 2011, pp. 311-320.
8. N. Husted, H. Saïdi, and A. Gehani, “Smartphone Security Limitations: Conflicting Traditions,” Proc. 2011 Workshop on Governance of Technology, Information, and Policies, ACM, 2011, pp. 5-12.
9. McAfee, Mobility and Security: Dazzling Opportunities, Profound Challenges, tech. report, May 2011; .
10. Juniper Networks, 2011 Mobile Threats Report, tech. report, Feb. 2012; jnpr-2011-mobile-threats-report.pdf .
11. K. Nohl, “Attacking Phone Privacy,” BlackHat Lecture Notes, July 2010; NohlBlackHat-USA-2010-Nohl-Attacking.Phone.Privacy-wp.pdf .
12. O. Kharif, “Mobile Spam Texts Hit 4.5 Billion Raising Consumer Ire,” Bloomberg Businessweek,30 April 2012; .
13. Z. Lackey and L. Miras, “Attacking SMS,” BlackHat, 2009.
14. BusinessWire, “Lookout Projects Lost and Stolen Phones Could Cost U.S. Consumers over $30 Billion in 2012,”22 Mar. 2012; enLookout-Projects-Lost-Stolen-Phones-Cost-U.S .
15. “Virginia Tech Cybersecurity Breakthrough Keeps Sensitive Data Confined in Physical Space, Engineering Team Says,” Virginia Tech News,17 Oct. 2011; .
16. P. Marquardt et al., “(sp)iphone: Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelerometers,” Proc. 18th ACM Conf. Computer and Communications Security (CCCS 11), ACM, 2011, pp. 551-562.
17. J. Burt, “BYOD Trend Pressures Corporate Networks,” eWeek, Sept. 2011, pp. 30-31.
18. A. Houmansadr, S. Zonouz, and R. Berthier, “A Cloud-Based Intrusion Detection and Response System for Mobile Phones,” Proc. Dependable Systems and Networks Workshops (DSN-W 11), IEEE, 2011, pp. 31-32.
19. D. Barrera and P. Van Oorschot, “Secure Software Installation on Smartphones,” IEEE Security and Privacy, May 2011, pp. 42-48.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool