Security and privacy of smartphone messaging applications

被引:7
作者
Mueller, Robin [1 ]
Schrittwieser, Sebastian [2 ]
Fruehwirt, Peter [3 ]
Kieseberg, Peter [3 ]
Weippl, Edgar [3 ]
机构
[1] Vienna Univ Technol, Vienna, Austria
[2] St Poelten Univ Appl Sci, St Polten, Austria
[3] SBA Res, Vienna, Austria
关键词
Access control; Mobile security; Security and protection; Smartphone messengers; Transport layer encryption;
D O I
10.1108/IJPCC-04-2015-0020
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose - This paper aims to give an overview on a number of selected applications in comparison to a previous evaluation conducted two years ago, as well as performing an analysis on several new applications. Mobile messaging and VoIP applications for smartphones have seen a massive surge in popularity, which has also sparked the interest in research related to their security and privacy protection, leading to in-depth analyses of specific applications or vulnerabilities. Design/methodology/approach - The evaluation methods mostly focus on known vulnerabilities in connection with authentication and validation mechanisms but also describe some newly identified attack vectors. Findings - The results show a positive trend for new applications, which are mostly being developed with security and privacy features, whereas some of the older applications have shown little progress or have even introduced new vulnerabilities. In addition, this paper shows privacy implications of smartphone messaging that are not even solved by today's most sophisticated "secure" smartphone messaging applications, as well as discusses methods for protecting user privacy during the creation of the user network. Research limitations/implications - Currently, there is no perfect solution available; thus, further research on this topic needs to be conducted. Originality/value - In addition to conducting a security evaluation of existing applications together with newly designed messengers that were designed with a security background in mind, several methods for protecting user privacy were discussed. Furthermore, some new attack vectors were discussed.
引用
收藏
页码:132 / +
页数:20
相关论文
共 22 条
[1]  
Android Developers, 2014, GOOGL CLOUD MESS AND
[2]  
Bishop M., 2018, COMPUTER SECURITY AR, V2
[3]  
Braga A., 2013, 3 INT C MOB SERV RES, P47
[4]  
Cheng Y., 2013, P 8 ACM SIGSAC S INF, P225
[5]  
Davi L, 2011, LECT NOTES COMPUT SC, V6531, P346
[6]  
Egele M., 2011, NETW DISTR SYST SEC
[7]  
Enck W., 2011, USENIX SEC S, V2, P2
[8]  
Enck W, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235
[9]  
Felt AP, 2011, 20 US SEC S SAN FRAN
[10]  
Fu K., 2001, P 10 C USENIX SEC S, V10, P19