This Article 
 Bibliographic References 
 Add to: 
Secure Software Installation on Smartphones
May/June 2011 (vol. 9 no. 3)
pp. 42-48
David Barrera, Carleton University
Paul van Oorschot, Carleton University
This overview of iOS, Android, BlackBerry, and Symbian security frameworks includes a novel classification of third-party-application installation models. It also discusses how controlled app marketplaces fit in the smartphone security ecosystem.

1. "Internet Trends," Morgan Stanley, 12 Apr. 2010; pdfsInternet_Trends_041210.pdf .
2. A. Shabtai et al., "Google Android: A Comprehensive Security Assessment," IEEE Security & Privacy, vol. 8, no. 2, 2010, pp. 35–44.
3. "Gartner Says Worldwide Mobile Device Sales to End Users Reached 1.6 Billion Units in 2010; Smartphone Sales Grew 72 Percent in 2010," Gartner, 9 Feb. 2011;
4. J. Anderson, J. Bonneau, and F. Stajano, "Inglorious Installers: Security in the Application Marketplace," Proc. 9th Workshop Economics of Information Security, 2010; weis2010_anderson_j.pdf.
5. "Apple Answers the FCC's Questions," Apple, 2011; .
6. W. Enck, M. Ongtang, and P. McDaniel, "Understanding Android Security," IEEE Security & Privacy, vol. 7, no. 1, 2009, pp. 50–57.

Index Terms:
operating systems, smartphones, software installation, security
David Barrera, Paul van Oorschot, "Secure Software Installation on Smartphones," IEEE Security & Privacy, vol. 9, no. 3, pp. 42-48, May-June 2011, doi:10.1109/MSP.2010.202
Usage of this product signifies your acceptance of the Terms of Use.