Abstract
We give an overview of existing security software on mobile platforms in form of firewalls and antivirus software. We investigate whether these solutions increase the security on mobile platforms, what limitations the platforms’ security policies present and how current solutions work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IDC: Android- and iOS-Powered Smartphones Expand Their Share of the Market in the First Quarter, According to IDC, http://www.idc.com/getdoc.jsp?containerId=prUS23503312 (retrieved on: May 26, 2012)
NorSIS: Sikre PC-en din, http://www.norsis.no/veiledninger/sikre_PCen_din.html (retrieved on: August 07, 2012)
Felt, A., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3–14. ACM (2011)
AV-TEST – The Independent IT-Security Institute: Test Report: Anti-Malware solutions for Android, http://www.av-test.org/fileadmin/pdf/avtest_2012-02_android_anti-malware_report_english.pdf (retrieved on: June 02, 2012)
Friedman, J., Hoffman, D.V.: Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses. Information-Knowledge-Systems Management 7(1,2), 159–180 (2008)
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: A comprehensive security assessment. IEEE Security & Privacy 8(2), 35–44 (2010)
Vidas, T., Votipka, D., Christin, N.: All your droid are belong to us: A survey of current android attacks. In: Proceedings of the 5th USENIX Conference on Offensive Technologies, p. 10. USENIX Association (2011)
Oberheide, J., Cooke, E., Jahanian, F.: Cloudav: N-version antivirus in the network cloud. In: Proceedings of the 17th Conference on Security Symposium, pp. 91–106. USENIX Association (2008)
Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized in-cloud security services for mobile devices. In: Proc. of MobiVirt 2008, pp. 31–35 (June 2008)
Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid Android: versatile protection for smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 347–356. ACM (2010)
Oberheide, J., Jahanian, F.: When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, pp. 43–48. ACM (2010)
Jacoby, G., Davis, N.: Battery-based intrusion detection. In: IEEE Global Telecommunications Conference, GLOBECOM 2004, vol. 4, pp. 2250–2255. IEEE (2004)
Kim, H., Smith, J., Shin, K.: Detecting energy-greedy anomalies and mobile malware variants. In: Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services, pp. 239–252 (2008)
Liu, L., Yan, G., Zhang, X., Chen, S.: Virusmeter: Preventing your cellphone from spies. In: Recent Advances in Intrusion Detection, pp. 244–264. Springer (2009)
Felt, A., Greenwood, K., Wagner, D.: The effectiveness of application permissions. In: Proceedings of the USENIX Conference on Web Application Development, p. 7 (2011)
Batyuk, L., Herpich, M., Camtepe, S., Raddatz, K., Schmidt, A., Albayrak, S.: Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications. In: 6th International Conference on Malicious and Unwanted Software (MALWARE), pp. 66–72. IEEE (2011)
McDermott, P.: Personal firewalls..one more step towards comprehensive security. Network Security 11, 11–14 (2000)
Rodrigo: Droidwall homepage, http://code.google.com/p/droidwall/ (retrieved on: May 29, 2012)
iptables(8) - iptables man page, https://git.netfilter.org/cgi-bin/gitweb.cgi?p=iptables.git (retrieved on June 02, 2012)
Yllier: Firewall IP homepage, http://yllier.webs.com/firewall.html (retrieved on: May 27, 2012)
Freeman, J.: MobileSubstrate homepage, http://svn.saurik.com/repos/menes/trunk/mobilesubstrate/ (retrieved on: May 30, 2012)
Cohen, F.: Computer Viruses. PhD thesis, University of Southern California (1985)
Hypponen, M.: Malware goes mobile. Scientific American 295(5), 70–77 (2006)
Schmidt, A., Schmidt, H., Batyuk, L., Clausen, J., Camtepe, S., Albayrak, S., Yildizli, C.: Smartphone malware evolution revisited: Android next target? In: 4th International Conference on Malicious and Unwanted Software (MALWARE), pp. 1–7 (2009)
F-Secure Labs. 2012. Mobile Threat Report Q1 2012, http://www.f-secure.com/weblog/archives/MobileThreatReport_Q1_2012.pdf (retrieved on: May 23, 2012)
Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Professional (2005)
MITRE Corporation: CVE-2010-1797, http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797 (retrieved on: May 30, 2012)
AVG: AVG’s response to community feedback regarding our Windows Phone 7 app, http://blogs.avg.com/product-news/avgs-response-community-feedback-windows-phone-7-app/ (retrieved on: May 10, 2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Adolphi, B., Langweg, H. (2012). Security Add-Ons for Mobile Platforms. In: Jøsang, A., Carlsson, B. (eds) Secure IT Systems. NordSec 2012. Lecture Notes in Computer Science, vol 7617. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34210-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-34210-3_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34209-7
Online ISBN: 978-3-642-34210-3
eBook Packages: Computer ScienceComputer Science (R0)