A Survey on Security for Mobile Devices
Top Cited Papers
- 15 March 2012
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Communications Surveys & Tutorials
- Vol. 15 (1), 446-471
- https://doi.org/10.1109/surv.2012.013012.00028
Abstract
Nowadays, mobile devices are an important part of our everyday lives since they enable us to access a large variety of ubiquitous services. In recent years, the availability of these ubiquitous and mobile services has significantly increased due to the different form of connectivity provided by mobile devices, such as GSM, GPRS, Bluetooth and Wi-Fi. In the same trend, the number and typologies of vulnerabilities exploiting these services and communication channels have increased as well. Therefore, smartphones may now represent an ideal target for malware writers. As the number of vulnerabilities and, hence, of attacks increase, there has been a corresponding rise of security solutions proposed by researchers. Due to the fact that this research field is immature and still unexplored in depth, with this paper we aim to provide a structured and comprehensive overview of the research on security solutions for mobile devices. This paper surveys the state of the art on threats, vulnerabilities and security solutions over the period 2004-2011, by focusing on high-level attacks, such those to user applications. We group existing approaches aimed at protecting mobile devices against these classes of attacks into different categories, based upon the detection principles, architectures, collected data and operating systems, especially focusing on IDS-based models and tools. With this categorization we aim to provide an easy and concise view of the underlying model adopted by each approach.Keywords
This publication has 88 references indexed in Scilit:
- Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiersSecurity and Communication Networks, 2011
- DoS attacks exploiting signaling in UMTS and IMSComputer Communications, 2011
- Intrusion detection for mobile devices using the knowledge-based, temporal abstraction methodJournal of Systems and Software, 2010
- An Analysis of the Robustness and Stability of the Network Stack in Symbian-based SmartphonesJournal of Networks, 2009
- A personal mobile DRM manager for smartphonesComputers & Security, 2009
- From desktop to mobile: Examining the security experienceComputers & Security, 2009
- The opportunistic transmission of wireless worms between mobile devicesPhysica A: Statistical Mechanics and its Applications, 2008
- Anomaly Detection on Mobile Phone Based Operational BehaviorIPSJ Digital Courier, 2008
- Malware Goes MobileScientific American, 2006
- Will wap deliver the wireless internet?Computer, 2000