The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2010 vol.8)
pp: 35-44
Asaf Shabtai , Ben-Gurion University of the Negev (BGU), Israel
Yuval Fledel , Ben-Gurion University of the Negev (BGU), Israel
Uri Kanonov , Ben-Gurion University of the Negev (BGU), Israel
Yuval Elovici , Ben-Gurion University of the Negev (BGU), Israel
Shlomi Dolev , Ben-Gurion University of the Negev (BGU), Israel
Chanan Glezer , Deutsche Telekom Laboratories
The Android framework, Google's new software stack for mobile devices, includes an operating system, middleware, and key applications. This research provides a comprehensive security assessment of this framework and its security mechanisms The authors conducted a methodological qualitative risk analysis that identifies high-risk threats to the framework and any potential danger to information or to the system resulting from vulnerabilities attackers have uncovered and exploited. They propose several security solutions for mitigating these risks.
security, mobile devices, Google, Android, risk analysis, security solutions for mobile devices
Asaf Shabtai, Yuval Fledel, Uri Kanonov, Yuval Elovici, Shlomi Dolev, Chanan Glezer, "Google Android: A Comprehensive Security Assessment", IEEE Security & Privacy, vol.8, no. 2, pp. 35-44, March/April 2010, doi:10.1109/MSP.2010.69
1. C. Dagon, T. Martin, and T. Starner, "Mobile Phones as Computing Devices: the Viruses Are Coming," IEEE Pervasive Computing, vol. 3, no. 4, 2004, pp. 11–15.
2. J. Cheng et al., "SmartSiren: Virus Detection and Alert for Smartphones," Proc. 5th Int'l Conf. Mobile Systems, Applications and Services (MobiSys 07), ACM Press, 2007, pp. 258–271.
3. A. Gostev, "Mobile Malware Evolution: An Overview,", 2006; .
4. D. Muthukumaran et al., "Measuring Integrity on Mobile Phone Systems," Proc. 13th ACM Symp. Access Control Models and Technologies, ACM Press, 2008, pp. 155–164.
5. D. Emm, "Mobile Malware—New Avenues," Network Security, vol. 2006, no. 11, 2006, pp. 4–6.
6. E.E. Schultz, "Where Have the Worms and Viruses Gone? New Trends in Malware," Computer Fraud and Security, vol. 2006, no. 7, 2006, pp. 4–8.
7. N. Leavitt, "Mobile Phones: The Next Frontier for Hackers?" Computer, vol. 38, no. 4, 2005, pp. 20–23.
8. M. Pelino, Predictions 2010: Enterprise Mobility Accelerates Again, Forrester, 2009.
9. W. Enck, M. Ongtang, and P. McDaniel, "Understanding Android Security," IEEE Security & Privacy, vol. 7, no. 1, 2009, pp. 50–57.
10. A. Shabtai, Y. Fledel, and Y. Elovici, "Securing Android-Powered Mobile Devices Using SELinux," IEEE Security & Privacy, to appear, 2010.
8 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool