The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - Jan.-Feb. (2013 vol.11)
pp: 78-81
Qing Li , Blue Coat Systems
Greg Clark , Blue Coat Systems
ABSTRACT
Fueled by widespread adoption of employee-owned devices in the workplace and the explosion of mobile applications, mobile device security is under heavy debate in both the academic and industry security communities. Businesses and government agencies are struggling to find some sense of control at a time when employee-owned devices now access some of the most sensitive data in an organization. Various approaches and solutions have been proposed, ranging from device-based intrusion detection systems, execution isolation through application sandboxing and bare metal hypervisors, ontology-based firewalls, behavior-based detection, to cloud-based protection through the use of VPN technology. The challenge of heterogeneous hardware and software platforms, such as iOS vs. Android OS, adds yet another layer of complexity to creating a comprehensive solution. The authors provide an overview of the current threats based on data collected from observing the interaction of 75 million users with the Internet. Extrapolating this data gives an insight into what threats wait on the horizon.
INDEX TERMS
Mobile communication, Computer security, Cloud computing, Malware, Mobile handsets, Mobile computing, malware, mobile device security, cloud-based defense
CITATION
Qing Li, Greg Clark, "Mobile Security: A Look Ahead", IEEE Security & Privacy, vol.11, no. 1, pp. 78-81, Jan.-Feb. 2013, doi:10.1109/MSP.2013.15
REFERENCES
1. T. Vidas, D. Votipka, and N. Christin, “All Your Droid Are Belong to Us: A Survey of Current Android Attacks,” Proc. 5th Usenix Conf. on Offensive Technologies (WOOT 11), Usenix, 2011, pp. 81–90.
2. M. Becher et al., “Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices,” Proc. 2011 IEEE Symp. Security and Privacy, IEEE CS, 2011, pp. 96–111.
3. T. Luo et al., “Attacks on WebView in the Android System,” Proc. 27th Ann. Computer Security Applications Conf . (ACSAC 11), ACM, 2011, pp. 343–352.
4. A. Porter Felt et al., “A Survey of Mobile Malware in the Wild,” Proc. 1st ACM Workshop Security and Privacy in Smartphones and Mobile Devices (SPSM 11), ACM, 2011, pp. 3–14.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool