This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Secure Software Installation on Smartphones
May/June 2011 (vol. 9 no. 3)
pp. 42-48
David Barrera, Carleton University
Paul van Oorschot, Carleton University
This overview of iOS, Android, BlackBerry, and Symbian security frameworks includes a novel classification of third-party-application installation models. It also discusses how controlled app marketplaces fit in the smartphone security ecosystem.

1. "Internet Trends," Morgan Stanley, 12 Apr. 2010; www.morganstanley.com/institutional/techresearch/ pdfsInternet_Trends_041210.pdf .
2. A. Shabtai et al., "Google Android: A Comprehensive Security Assessment," IEEE Security & Privacy, vol. 8, no. 2, 2010, pp. 35–44.
3. "Gartner Says Worldwide Mobile Device Sales to End Users Reached 1.6 Billion Units in 2010; Smartphone Sales Grew 72 Percent in 2010," Gartner, 9 Feb. 2011; www.gartner.com/itpage.jsp?id=1543014.
4. J. Anderson, J. Bonneau, and F. Stajano, "Inglorious Installers: Security in the Application Marketplace," Proc. 9th Workshop Economics of Information Security, 2010; http://weis2010.econinfosec.org/papers/session3 weis2010_anderson_j.pdf.
5. "Apple Answers the FCC's Questions," Apple, 2011; www.apple.com/hotnewsapple-answers-fcc-questions .
6. W. Enck, M. Ongtang, and P. McDaniel, "Understanding Android Security," IEEE Security & Privacy, vol. 7, no. 1, 2009, pp. 50–57.

Index Terms:
operating systems, smartphones, software installation, security
Citation:
David Barrera, Paul van Oorschot, "Secure Software Installation on Smartphones," IEEE Security & Privacy, vol. 9, no. 3, pp. 42-48, May-June 2011, doi:10.1109/MSP.2010.202
Usage of this product signifies your acceptance of the Terms of Use.