A Survey on Security for Mobile Devices

被引:281
作者
La Polla, Mariantonietta [1 ]
Martinelli, Fabio [1 ]
Sgandurra, Daniele [1 ]
机构
[1] CNR, Ist Informat & Telemat, I-56100 Pisa, Italy
关键词
Mobile Security; Intrusion Detection; Mobile Malware; Trusted Mobile; MALWARE DETECTION; MALICIOUS SOFTWARE; BLUETOOTH WORMS; ATTACKS; PREVENTION; CELLPHONE; DYNAMICS; PHONES;
D O I
10.1109/SURV.2012.013012.00028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, mobile devices are an important part of our everyday lives since they enable us to access a large variety of ubiquitous services. In recent years, the availability of these ubiquitous and mobile services has significantly increased due to the different form of connectivity provided by mobile devices, such as GSM, GPRS, Bluetooth and Wi-Fi. In the same trend, the number and typologies of vulnerabilities exploiting these services and communication channels have increased as well. Therefore, smartphones may now represent an ideal target for malware writers. As the number of vulnerabilities and, hence, of attacks increase, there has been a corresponding rise of security solutions proposed by researchers. Due to the fact that this research field is immature and still unexplored in depth, with this paper we aim to provide a structured and comprehensive overview of the research on security solutions for mobile devices. This paper surveys the state of the art on threats, vulnerabilities and security solutions over the period 2004-2011, by focusing on high-level attacks, such those to user applications. We group existing approaches aimed at protecting mobile devices against these classes of attacks into different categories, based upon the detection principles, architectures, collected data and operating systems, especially focusing on IDS-based models and tools. With this categorization we aim to provide an easy and concise view of the underlying model adopted by each approach.
引用
收藏
页码:446 / 471
页数:26
相关论文
共 163 条
[1]  
Acicmez O, 2008, CONSUM COMM NETWORK, P1208
[2]  
Alpcan T, 2010, LECT NOTES COMPUT SC, V6033, P31, DOI 10.1007/978-3-642-12368-9_3
[3]  
[Anonymous], PROTECTING SMART PHO
[4]  
[Anonymous], THESIS U MANNHEIM
[5]  
[Anonymous], WHITEPAPER
[6]  
[Anonymous], P IEEE SEC PRIV MAY
[7]  
[Anonymous], APPLE SUED PRIVACY I
[8]  
[Anonymous], MOB SEC REP 2009
[9]  
[Anonymous], 2011, USENIX SECURITY S
[10]  
[Anonymous], SMARTPHONES INFORM T