The Community for Technology Leaders
RSS Icon
Issue No.03 - May/June (2011 vol.9)
pp: 42-48
David Barrera , Carleton University
Paul van Oorschot , Carleton University
This overview of iOS, Android, BlackBerry, and Symbian security frameworks includes a novel classification of third-party-application installation models. It also discusses how controlled app marketplaces fit in the smartphone security ecosystem.
operating systems, smartphones, software installation, security
David Barrera, Paul van Oorschot, "Secure Software Installation on Smartphones", IEEE Security & Privacy, vol.9, no. 3, pp. 42-48, May/June 2011, doi:10.1109/MSP.2010.202
1. "Internet Trends," Morgan Stanley, 12 Apr. 2010; pdfsInternet_Trends_041210.pdf .
2. A. Shabtai et al., "Google Android: A Comprehensive Security Assessment," IEEE Security & Privacy, vol. 8, no. 2, 2010, pp. 35–44.
3. "Gartner Says Worldwide Mobile Device Sales to End Users Reached 1.6 Billion Units in 2010; Smartphone Sales Grew 72 Percent in 2010," Gartner, 9 Feb. 2011;
4. J. Anderson, J. Bonneau, and F. Stajano, "Inglorious Installers: Security in the Application Marketplace," Proc. 9th Workshop Economics of Information Security, 2010; weis2010_anderson_j.pdf.
5. "Apple Answers the FCC's Questions," Apple, 2011; .
6. W. Enck, M. Ongtang, and P. McDaniel, "Understanding Android Security," IEEE Security & Privacy, vol. 7, no. 1, 2009, pp. 50–57.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool