This Article 
 Bibliographic References 
 Add to: 
Bloatware Comes to the Smartphone
July-Aug. 2012 (vol. 10 no. 4)
pp. 85-87
Patrick McDaniel, Pennsylvania State University
The author explores the security and privacy implications of the now-common industry practice of installing bloatware on phones sold by cellular carriers. Is it merely annoying, or do smartphone users face more serious concerns? Do the economic advantages outweigh the security and privacy concerns?

1. R. Ritchie, “True Cost of Apple Control: No Carrier Bloatware on iPhone,” iMore, July 2010; .
2. J. Aimonetti, “Apple Holds Strong over Bloatware in Japan,” CNET, Nov. 2011; apple-holds-strong-over-bloatware-in-japan .
3. W. Enck et al., “A Study of Android Application Security,” Proc. 20th Usenix Security Symp., Usenix Assoc., 2011;
4. W. Enck et al., “TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones,” Proc. 9th Usenix Symp. Operating Systems Design and Implementation (OSDI 10), Usenix Assoc., 2010; http://appanalysis.orgtdroid10.pdf.
5. Z. Lutz, “Carrier IQ: What It Is, What It Isn't, and What You Need to Know,” Engadget, 1 Dec. 2011; .

Index Terms:
CarrierIQ,bloatware,smartphone,end-user license agreement
Patrick McDaniel, "Bloatware Comes to the Smartphone," IEEE Security & Privacy, vol. 10, no. 4, pp. 85-87, July-Aug. 2012, doi:10.1109/MSP.2012.92
Usage of this product signifies your acceptance of the Terms of Use.