The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.12 - Dec. (2012 vol.45)
pp: 52-58
Yong Wang , Dakota State University
Kevin Streff , Dakota State University
Sonell Raman , Dakota State University
ABSTRACT
Because of their unique characteristics, smartphones present challenges requiring new business models that offer countermeasures to help ensure their security.
INDEX TERMS
Smart phones, Malware, Mobile communication, Digital forensics, Batteries, Forensics, mobile forensics, smartphones, security, threats, attacks
CITATION
Yong Wang, Kevin Streff, Sonell Raman, "Smartphone Security Challenges", Computer, vol.45, no. 12, pp. 52-58, Dec. 2012, doi:10.1109/MC.2012.288
REFERENCES
1. IDC, “Mobile Phone Market Grows 17.9% in Fourth Quarter, According to IDC,” press release, 28 Jan. 2011; www.idc.com/aboutviewpressrelease.jsp?containerId=prUS22679411 .
2. IDC, “Smartphones Outstrip Feature Phones for First Time in Western Europe as Android Sees Strong Growth in 2Q11, Says IDC,” press release, 9 Sept. 2011; www.idc.comgetdoc.jsp?containerId=prUK23024911 .
3. Nielsen, “In US, Smartphones Now Majority of New Cellphone Purchases,” blog, 30 June 2011; http://blog.nielsen.com/nielsenwire/online_mobile in-us-smartphones-now-majority-of-new-cellphone-purchases .
4. ITU, “Key Global Telecom Indicators for the World Telecommunication Service Sector,” Nov. 2011; www.itu.int/ITU-D/ict/statistics/at_glance KeyTelecom.html.
5. IDC, “Worldwide Smartphone Market Expected to Grow 55% in 2011 and Approach Shipments of One Billion in 2015,” June 2011; www.idc.comgetdoc.jsp?containerID=prUS22871611 .
6. N. Leavitt, “Mobile Security: Finally a Serious Problem?”, Computer, June 2011, pp. 11-14.
7. W. Jeon et al., “A Practical Analysis of Smartphone Security,” Proc. Int'l Conf. Human Interface and the Management of Information—Part I, Springer-Verlag, 2011, pp. 311-320.
8. N. Husted, H. Saïdi, and A. Gehani, “Smartphone Security Limitations: Conflicting Traditions,” Proc. 2011 Workshop on Governance of Technology, Information, and Policies, ACM, 2011, pp. 5-12.
9. McAfee, Mobility and Security: Dazzling Opportunities, Profound Challenges, tech. report, May 2011; www.mcafee.com/us/resources/reportsrp-cylab-mobile-security.pdf .
10. Juniper Networks, 2011 Mobile Threats Report, tech. report, Feb. 2012; www.juniper.net/us/en/local/pdf/additional-resources jnpr-2011-mobile-threats-report.pdf .
11. K. Nohl, “Attacking Phone Privacy,” BlackHat Lecture Notes, July 2010; http://media.blackhat.com/bh-us-10/whitepapers/ NohlBlackHat-USA-2010-Nohl-Attacking.Phone.Privacy-wp.pdf .
12. O. Kharif, “Mobile Spam Texts Hit 4.5 Billion Raising Consumer Ire,” Bloomberg Businessweek,30 April 2012; www.businessweek.com/news/2012-04-30mobile-spam-texts-hit-4-dot-5-billion-raising-consumer-ire .
13. Z. Lackey and L. Miras, “Attacking SMS,” BlackHat, 2009.
14. BusinessWire, “Lookout Projects Lost and Stolen Phones Could Cost U.S. Consumers over $30 Billion in 2012,”22 Mar. 2012; www.businesswire.com/news/home/20120322005325 enLookout-Projects-Lost-Stolen-Phones-Cost-U.S .
15. “Virginia Tech Cybersecurity Breakthrough Keeps Sensitive Data Confined in Physical Space, Engineering Team Says,” Virginia Tech News,17 Oct. 2011; www.vtnews.vt.edu/articles/2011/10101711-outreach-cybersecurephones.html .
16. P. Marquardt et al., “(sp)iphone: Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelerometers,” Proc. 18th ACM Conf. Computer and Communications Security (CCCS 11), ACM, 2011, pp. 551-562.
17. J. Burt, “BYOD Trend Pressures Corporate Networks,” eWeek, Sept. 2011, pp. 30-31.
18. A. Houmansadr, S. Zonouz, and R. Berthier, “A Cloud-Based Intrusion Detection and Response System for Mobile Phones,” Proc. Dependable Systems and Networks Workshops (DSN-W 11), IEEE, 2011, pp. 31-32.
19. D. Barrera and P. Van Oorschot, “Secure Software Installation on Smartphones,” IEEE Security and Privacy, May 2011, pp. 42-48.
9 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool