A Risk Assessment Method for Smartphones

被引:0
作者
Theoharidou, Marianthi [1 ]
Mylonas, Alexios [1 ]
Gritzalis, Dimitris [1 ]
机构
[1] Athens Univ Econ & Business AUEB, Dept Informat, Informat Secur & Crit Infrastruct Protect Res Lab, GR-10434 Athens, Greece
来源
INFORMATION SECURITY AND PRIVACY RESEARCH | 2012年 / 376卷
关键词
Smartphone; Risk Assessment; Android; Security; Threat;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Smartphones are multi-purpose ubiquitous devices, which face both, smartphone-specific and typical security threats. This paper describes a method for risk assessment that is tailored for smartphones. The method does not treat this kind of device as a single entity. Instead, it identifies smartphone assets and provides a detailed list of specific applicable threats. For threats that use application permissions as the attack vector, risk triplets are facilitated. The triplets associate assets to threats and permission combinations. Then, risk is assessed as a combination of asset impact and threat likelihood. The method utilizes user input, with respect to impact valuation, coupled with statistics for threat likelihood calculation. Finally, the paper provides a case study, which demonstrates the risk assessment method in the Android platform.
引用
收藏
页码:443 / 456
页数:14
相关论文
共 21 条
  • [1] [Anonymous], 2011, USENIX SECURITY S
  • [2] [Anonymous], 270052008 ISOIEC
  • [3] [Anonymous], THESIS
  • [4] [Anonymous], TECHNICAL REPORT
  • [5] [Anonymous], 2012, P 19 NETW DISTR SYST
  • [6] Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
    Becher, Michael
    Freiling, Felix C.
    Hoffmann, Johannes
    Holz, Thorsten
    Uellenbeck, Sebastian
    Wolf, Christopher
    [J]. 2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 96 - 111
  • [7] Smart security
    Caldwell T.
    [J]. Network Security, 2011, 2011 (04) : 5 - 9
  • [8] Dietz M., 2011, 20 USENIX SEC S US
  • [9] Information security: The moving target
    Dlamini, M. T.
    Eloff, J. H. P.
    Eloff, M. M.
    [J]. COMPUTERS & SECURITY, 2009, 28 (3-4) : 189 - 198
  • [10] Felt A.P., 2011, 2nd USENIX Conference on Web Application Development, P75