Skip to main content

Security Add-Ons for Mobile Platforms

  • Conference paper
Book cover Secure IT Systems (NordSec 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7617))

Included in the following conference series:

Abstract

We give an overview of existing security software on mobile platforms in form of firewalls and antivirus software. We investigate whether these solutions increase the security on mobile platforms, what limitations the platforms’ security policies present and how current solutions work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IDC: Android- and iOS-Powered Smartphones Expand Their Share of the Market in the First Quarter, According to IDC, http://www.idc.com/getdoc.jsp?containerId=prUS23503312 (retrieved on: May 26, 2012)

  2. NorSIS: Sikre PC-en din, http://www.norsis.no/veiledninger/sikre_PCen_din.html (retrieved on: August 07, 2012)

  3. Felt, A., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3–14. ACM (2011)

    Google Scholar 

  4. AV-TEST – The Independent IT-Security Institute: Test Report: Anti-Malware solutions for Android, http://www.av-test.org/fileadmin/pdf/avtest_2012-02_android_anti-malware_report_english.pdf (retrieved on: June 02, 2012)

  5. Friedman, J., Hoffman, D.V.: Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses. Information-Knowledge-Systems Management 7(1,2), 159–180 (2008)

    Google Scholar 

  6. Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: A comprehensive security assessment. IEEE Security & Privacy 8(2), 35–44 (2010)

    Article  Google Scholar 

  7. Vidas, T., Votipka, D., Christin, N.: All your droid are belong to us: A survey of current android attacks. In: Proceedings of the 5th USENIX Conference on Offensive Technologies, p. 10. USENIX Association (2011)

    Google Scholar 

  8. Oberheide, J., Cooke, E., Jahanian, F.: Cloudav: N-version antivirus in the network cloud. In: Proceedings of the 17th Conference on Security Symposium, pp. 91–106. USENIX Association (2008)

    Google Scholar 

  9. Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized in-cloud security services for mobile devices. In: Proc. of MobiVirt 2008, pp. 31–35 (June 2008)

    Google Scholar 

  10. Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid Android: versatile protection for smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 347–356. ACM (2010)

    Google Scholar 

  11. Oberheide, J., Jahanian, F.: When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, pp. 43–48. ACM (2010)

    Google Scholar 

  12. Jacoby, G., Davis, N.: Battery-based intrusion detection. In: IEEE Global Telecommunications Conference, GLOBECOM 2004, vol. 4, pp. 2250–2255. IEEE (2004)

    Google Scholar 

  13. Kim, H., Smith, J., Shin, K.: Detecting energy-greedy anomalies and mobile malware variants. In: Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services, pp. 239–252 (2008)

    Google Scholar 

  14. Liu, L., Yan, G., Zhang, X., Chen, S.: Virusmeter: Preventing your cellphone from spies. In: Recent Advances in Intrusion Detection, pp. 244–264. Springer (2009)

    Google Scholar 

  15. Felt, A., Greenwood, K., Wagner, D.: The effectiveness of application permissions. In: Proceedings of the USENIX Conference on Web Application Development, p. 7 (2011)

    Google Scholar 

  16. Batyuk, L., Herpich, M., Camtepe, S., Raddatz, K., Schmidt, A., Albayrak, S.: Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications. In: 6th International Conference on Malicious and Unwanted Software (MALWARE), pp. 66–72. IEEE (2011)

    Google Scholar 

  17. McDermott, P.: Personal firewalls..one more step towards comprehensive security. Network Security 11, 11–14 (2000)

    Article  Google Scholar 

  18. Rodrigo: Droidwall homepage, http://code.google.com/p/droidwall/ (retrieved on: May 29, 2012)

  19. iptables(8) - iptables man page, https://git.netfilter.org/cgi-bin/gitweb.cgi?p=iptables.git (retrieved on June 02, 2012)

  20. Yllier: Firewall IP homepage, http://yllier.webs.com/firewall.html (retrieved on: May 27, 2012)

  21. Freeman, J.: MobileSubstrate homepage, http://svn.saurik.com/repos/menes/trunk/mobilesubstrate/ (retrieved on: May 30, 2012)

  22. Cohen, F.: Computer Viruses. PhD thesis, University of Southern California (1985)

    Google Scholar 

  23. Hypponen, M.: Malware goes mobile. Scientific American 295(5), 70–77 (2006)

    Article  Google Scholar 

  24. Schmidt, A., Schmidt, H., Batyuk, L., Clausen, J., Camtepe, S., Albayrak, S., Yildizli, C.: Smartphone malware evolution revisited: Android next target? In: 4th International Conference on Malicious and Unwanted Software (MALWARE), pp. 1–7 (2009)

    Google Scholar 

  25. F-Secure Labs. 2012. Mobile Threat Report Q1 2012, http://www.f-secure.com/weblog/archives/MobileThreatReport_Q1_2012.pdf (retrieved on: May 23, 2012)

  26. Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Professional (2005)

    Google Scholar 

  27. MITRE Corporation: CVE-2010-1797, http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797 (retrieved on: May 30, 2012)

  28. AVG: AVG’s response to community feedback regarding our Windows Phone 7 app, http://blogs.avg.com/product-news/avgs-response-community-feedback-windows-phone-7-app/ (retrieved on: May 10, 2012)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Adolphi, B., Langweg, H. (2012). Security Add-Ons for Mobile Platforms. In: Jøsang, A., Carlsson, B. (eds) Secure IT Systems. NordSec 2012. Lecture Notes in Computer Science, vol 7617. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34210-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34210-3_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34209-7

  • Online ISBN: 978-3-642-34210-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics