This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Bloatware Comes to the Smartphone
July-Aug. 2012 (vol. 10 no. 4)
pp. 85-87
Patrick McDaniel, Pennsylvania State University
The author explores the security and privacy implications of the now-common industry practice of installing bloatware on phones sold by cellular carriers. Is it merely annoying, or do smartphone users face more serious concerns? Do the economic advantages outweigh the security and privacy concerns?

1. R. Ritchie, “True Cost of Apple Control: No Carrier Bloatware on iPhone,” iMore, July 2010; www.imore.com/2010/07/22true-cost-apple-control-bloatware-iphone .
2. J. Aimonetti, “Apple Holds Strong over Bloatware in Japan,” CNET, Nov. 2011; http://reviews.cnet.com/8301-19512_7-57325506-233 apple-holds-strong-over-bloatware-in-japan .
3. W. Enck et al., “A Study of Android Application Security,” Proc. 20th Usenix Security Symp., Usenix Assoc., 2011; www.enck.org/pubsenck-sec11.pdf.
4. W. Enck et al., “TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones,” Proc. 9th Usenix Symp. Operating Systems Design and Implementation (OSDI 10), Usenix Assoc., 2010; http://appanalysis.orgtdroid10.pdf.
5. Z. Lutz, “Carrier IQ: What It Is, What It Isn't, and What You Need to Know,” Engadget, 1 Dec. 2011; www.engadget.com/2011/12/01carrier-iq-what-it-is-what-it-isnt-and-what-you-need-to .

Index Terms:
CarrierIQ,bloatware,smartphone,end-user license agreement
Citation:
Patrick McDaniel, "Bloatware Comes to the Smartphone," IEEE Security & Privacy, vol. 10, no. 4, pp. 85-87, July-Aug. 2012, doi:10.1109/MSP.2012.92
Usage of this product signifies your acceptance of the Terms of Use.