Mobile security catching up? revealing the nuts and bolts of the security of mobile devices

M Becher, FC Freiling, J Hoffmann… - … IEEE Symposium on …, 2011 - ieeexplore.ieee.org
M Becher, FC Freiling, J Hoffmann, T Holz, S Uellenbeck, C Wolf
2011 IEEE Symposium on Security and Privacy, 2011ieeexplore.ieee.org
We are currently moving from the Internet society to a mobile society where more and more
access to information is done by previously dumb phones. For example, the number of
mobile phones using a full blown OS has risen to nearly200% from Q3/2009 to Q3/2010. As
a result, mobile security is no longer immanent, but imperative. This survey paper provides a
concise overview of mobile network security, attack vectors using the back end system and
the web browser, but also the hardware layer and the user as attack enabler. We show …
We are currently moving from the Internet society to a mobile society where more and more access to information is done by previously dumb phones. For example, the number of mobile phones using a full blown OS has risen to nearly200% from Q3/2009 to Q3/2010. As a result, mobile security is no longer immanent, but imperative. This survey paper provides a concise overview of mobile network security, attack vectors using the back end system and the web browser, but also the hardware layer and the user as attack enabler. We show differences and similarities between "normal" security and mobile security, and draw conclusions for further research opportunities in this area.
ieeexplore.ieee.org