2013
DOI: 10.1109/surv.2012.013012.00028
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Security for Mobile Devices

Abstract: Nowadays, mobile devices are an important part of our everyday lives since they enable us to access a large variety of ubiquitous services. In recent years, the availability of these ubiquitous and mobile services has significantly increased due to the different form of connectivity provided by mobile devices, such as GSM, GPRS, Bluetooth and Wi-Fi. In the same trend, the number and typologies of vulnerabilities exploiting these services and communication channels have increased as well. Therefore, smartphones… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
225
0
2

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 421 publications
(228 citation statements)
references
References 95 publications
(79 reference statements)
1
225
0
2
Order By: Relevance
“…Since sensitive information travels over insecure channels [60,61], privacy policies and security methods should be provided to make the app reliable and trusted. Moreover, given the lack of security knowledge of the users [60] and similar to security icons on mobile web-browsers [62], information about security and privacy methods used by the app should be provided to the user.…”
Section: (Vi) Visual Distinction Between Individual and Group Chatsmentioning
confidence: 99%
“…Since sensitive information travels over insecure channels [60,61], privacy policies and security methods should be provided to make the app reliable and trusted. Moreover, given the lack of security knowledge of the users [60] and similar to security icons on mobile web-browsers [62], information about security and privacy methods used by the app should be provided to the user.…”
Section: (Vi) Visual Distinction Between Individual and Group Chatsmentioning
confidence: 99%
“…Existing smartphone security surveys review the state of the art regarding popular mobile OS platforms [46,41]. In particular, La Polla et al [41] surveyed smartphone security threats and their solutions for the period 2004-2011, but has very limited coverage of Android.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, La Polla et al [41] surveyed smartphone security threats and their solutions for the period 2004-2011, but has very limited coverage of Android. In the survey papers [29,42,47] the authors focus on the Android platform, but they only perform an informal analysis of the security model.…”
Section: Related Workmentioning
confidence: 99%
“…More recently, static analysis techniques have also been applied for dissecting Android applications [9,12,14]. However, we note that current approaches still present a number of limitations when they are targeted to code from the Android system.…”
Section: Static Analysis For Android Appsmentioning
confidence: 99%