Abstract
Recent developments in mobile technologies have produced a new kind of device, a programmable mobile phone, the smartphone. Generally, smartphone users can program any application which is customized for needs. Furthermore, they can share these applications in online market. Therefore, smartphone and its application are now most popular keywords in mobile technology. However, to provide these customized services, smartphone needs more private information and this can cause security vulnerabilities. Therefore, in this work, we analyze security of smartphone based on its environments and describe countermeasures.
This research was supported by Basic Science Research Program thorough the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(2010-0011279).
Chapter PDF
Similar content being viewed by others
References
Mulliner, C.R.: Security of Smart Phone, Master’s Thesis of University of California (June 2006)
Guo, C., Wang, H.J., Zhu, W.: Smart-Phone Attacks and Defenses. In: HotNets III (November 2004)
Chen, J.V., Yen, D.C., Chen, K.: The acceptance and diffusion of the innovative smart phone use: A case study of a delivery service company in logistics. Information & Management 46(4) (2009)
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S.: Google Android: A State of the Art Review of Security Mechanisms, arXiv 2009 (November 2009)
Monk, A., Fellas, E., Ley, E.: Hearing only one side of normal and mobile phone conversations. Behaviour & Informaion Technology 23(5) (September 2004)
Ni, X., Yang, Z., Bai, X., Champion, A.C., Xuan, D.: DiffUser: Differentiated User Access Control on Smartphones. In: Proc. 5th IEEE Int’l. Workshop on Wireless and Sensor Networks Security, WSNS 2009 (September 2009)
Schmidt, A.-D., Schmidt, H.-G., Clausen, J., Camtepe, A., Albayrak, S.: Enhancing Security of Linux-Based Android Devices. In: 15th International Linux Kongress (October 2008)
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S.: Google Android: A State-of-the-Art Review of Security Mechanisms, Cornell University library (2009)
Smartphone: Information security risks, opportunities and recommendations for users, ENISA Report (December 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jeon, W., Kim, J., Lee, Y., Won, D. (2011). A Practical Analysis of Smartphone Security. In: Smith, M.J., Salvendy, G. (eds) Human Interface and the Management of Information. Interacting with Information. Human Interface 2011. Lecture Notes in Computer Science, vol 6771. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21793-7_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-21793-7_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21792-0
Online ISBN: 978-3-642-21793-7
eBook Packages: Computer ScienceComputer Science (R0)