The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July-Aug. (2012 vol.10)
pp: 85-87
Patrick McDaniel , Pennsylvania State University
ABSTRACT
The author explores the security and privacy implications of the now-common industry practice of installing bloatware on phones sold by cellular carriers. Is it merely annoying, or do smartphone users face more serious concerns? Do the economic advantages outweigh the security and privacy concerns?
INDEX TERMS
CarrierIQ, bloatware, smartphone, end-user license agreement
CITATION
Patrick McDaniel, "Bloatware Comes to the Smartphone", IEEE Security & Privacy, vol.10, no. 4, pp. 85-87, July-Aug. 2012, doi:10.1109/MSP.2012.92
REFERENCES
1. R. Ritchie, “True Cost of Apple Control: No Carrier Bloatware on iPhone,” iMore, July 2010; www.imore.com/2010/07/22true-cost-apple-control-bloatware-iphone .
2. J. Aimonetti, “Apple Holds Strong over Bloatware in Japan,” CNET, Nov. 2011; http://reviews.cnet.com/8301-19512_7-57325506-233 apple-holds-strong-over-bloatware-in-japan .
3. W. Enck et al., “A Study of Android Application Security,” Proc. 20th Usenix Security Symp., Usenix Assoc., 2011; www.enck.org/pubsenck-sec11.pdf.
4. W. Enck et al., “TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones,” Proc. 9th Usenix Symp. Operating Systems Design and Implementation (OSDI 10), Usenix Assoc., 2010; http://appanalysis.orgtdroid10.pdf.
5. Z. Lutz, “Carrier IQ: What It Is, What It Isn't, and What You Need to Know,” Engadget, 1 Dec. 2011; www.engadget.com/2011/12/01carrier-iq-what-it-is-what-it-isnt-and-what-you-need-to .
36 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool