Mobile Firewall applications: an analysis of usability and effectiveness

被引:0
作者
Louman, Wouter [1 ]
Vernee, Mitchell [1 ]
de Bruijn, Danique [1 ]
van't Riet, Babette [1 ]
Alers, Hani [1 ]
机构
[1] Hague Univ Appl Sci, Bleiswijkseweg 37, NL-2712 PB Zoetermeer, Netherlands
来源
2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP) | 2021年
关键词
Heuristic evaluation; Usability; Firewall; Mobile applications; Mobile security;
D O I
10.1109/CSP51677.2021.9357491
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The amount of smartphone users worldwide exceeds three billion and that number is expected to grow. Sensitive data is often stored on the memory of smartphones and users of smartphones tend to be concerned about their data leaking out. Firewalls might prevent this, but do these firewalls work as expected? Do they block internet access for specific applications on the phone if requested? If these firewalls were to be used by technical and non-technical users, the user-friendliness is an important aspect as well. In order to examine the user-friendliness and effectiveness of the firewall applications in this research, usability tests and network traffic analyses are performed. The results of the network traffic analyses show that firewall applications do not blocks all network traffic when all applications are blocked. Usability tests indicate that the user-friendliness of firewall applications leaves much room for improvement.
引用
收藏
页码:148 / 152
页数:5
相关论文
共 8 条
  • [1] [Anonymous], 2020, Number of smartphone users worldwide from 2016 to 2021
  • [2] Google, 2019, Google Play
  • [3] Lessard J., 2010, SMALL SCALE DIGITAL, V4
  • [4] Muhammad Nooh Bany., 2018, 2018 INT C INF COMP, DOI [10.1109/INFOCT.2018.8356847, DOI 10.1109/INFOCT.2018.8356847]
  • [5] mxttoolbox.com, 2019, SUP
  • [6] Nielsen J, 1990, P SIGCHI C HUM FACT, DOI DOI 10.1145/97243.97281
  • [7] Security aspects of mobile phone virus: a critical survey
    Shih, Dong-Her
    Lin, Binshan
    Chiang, Hslu-Sen
    Shih, Ming-Hung
    [J]. INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2008, 108 (3-4) : 478 - 494
  • [8] Wireshark, Wireshark go deep