Abstract
Recently, the interest and demands for mobile communications are growing so fast because of the increasing prevalence of smartphones around the world. In addition, the existing feature phones were replaced by smartphones and it has widely improved while using the explosive growth of Internet users using smartphones, e-commerce enabled Internet banking transactions and the importance of protecting personal information. Therefore, the development of smartphones antivirus products was developed and launched in order to prevent malicious code or virus infection. In this paper, we proposed a new scheme to protect the smartphone from malicious codes and malicious applications that are element of security threats in mobile environment and to prevent information leakage from malicious code infection. The proposed scheme is based on the white list smartphone application which only allows installing authorized applications and to prevent the installation of malicious and untrusted mobile applications which can possibly infect the applications and programs of smartphones.
This work was supported by the Security Engineering Research Center, granted by the Korea Ministry of Knowledge Economy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hypponen, M.: Malware goes Mobile.: Technical Report, INC (2006)
Gartner.: Worldwide Smartphone Sales to End Users in 2Q2009. (2009)
Kim, K.Y., Kang, D.H.: Smart Phone Security Technology in Opened Mobile Environment. Korea Institute of Information Security & Cryptology 19(5) (2009)
Mulliner, C.: Security of Smart Phones. Master Thesis (2006)
AhnLab, http://www.ahnlab.com/kr/site/securitycenter/securitycenterMain.do
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, K., Tolentino, R.S., Park, GC., Kim, YT. (2010). A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment. In: Kim, Th., Chang, A.CC., Li, M., Rong, C., Patrikakis, C.Z., Ślęzak, D. (eds) Communication and Networking. FGCN 2010. Communications in Computer and Information Science, vol 119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17587-9_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-17587-9_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17586-2
Online ISBN: 978-3-642-17587-9
eBook Packages: Computer ScienceComputer Science (R0)