The Community for Technology Leaders
Green Image
Issue No. 04 - July-Aug. (2011 vol. 9)
ISSN: 1540-7993
pp: 68-70
Charlie Miller , Accuvant Labs
Smartphones' features are great, but with the power they provide, there's also a threat. Smartphones are becoming a target of attackers in the same way PCs have been for many years. This article examines the security models of two popular smart phone operating systems: Apple's iOS and Google's Android.
smart phone, Android, iPhone, iOS, computer security, jailbreaking, malware, App Store, Android Market, sandbox, SMS, data execution prevention, DEP, address space layout randomization, ASLR

C. Miller, "Mobile Attacks and Defense," in IEEE Security & Privacy, vol. 9, no. , pp. 68-70, 2011.
80 ms
(Ver 3.3 (11022016))