Survey on Mobile User's Data Privacy Threats and Defense Mechanisms

作者: Jalaluddin Khan , Haider Abbas , Jalal Al-Muhtadi

DOI: 10.1016/J.PROCS.2015.07.223

关键词:

摘要: … issues and data privacy threats in a mobile ecosystem. In this paper, we provide a brief survey of … to ensure mobile security and defend against data privacy threats. The emphasis of the …

参考文章(24)
Collin Mulliner, Charlie Miller, Injecting SMS messages into smart phones for security analysis WOOT'09 Proceedings of the 3rd USENIX conference on Offensive technologies. pp. 5- 5 ,(2009)
Qiang Yan, Yingjiu Li, Tieyan Li, Robert Deng, Insights into Malware Detection and Prevention on Mobile Phones International Conference on Security Technology. ,vol. 58, pp. 242- 249 ,(2009) , 10.1007/978-3-642-10847-1_30
Julian Jang-Jaccard, Surya Nepal, None, A survey of emerging threats in cybersecurity Journal of Computer and System Sciences. ,vol. 80, pp. 973- 993 ,(2014) , 10.1016/J.JCSS.2014.02.005
Wook Shin, Sanghoon Kwak, Shinsaku Kiyomoto, K Fukushima, Toshiaki Tanaka, A Small But Non-negligible Flaw in the Android Permission Scheme ieee international symposium on policies for distributed systems and networks. pp. 107- 110 ,(2010) , 10.1109/POLICY.2010.11
Seyedmostafa Safavi, Zarina Shukur, Rozilawati Razali, Reviews on Cybercrime Affecting Portable Devices Procedia Technology. ,vol. 11, pp. 650- 657 ,(2013) , 10.1016/J.PROTCY.2013.12.241
Sherly Abraham, InduShobha Chengalur-Smith, An overview of social engineering malware: Trends, tactics, and implications Technology in Society. ,vol. 32, pp. 183- 196 ,(2010) , 10.1016/J.TECHSOC.2010.07.001
Mikko Hypponen, Malware Goes Mobile Scientific American. ,vol. 295, pp. 70- 77 ,(2006) , 10.1038/SCIENTIFICAMERICAN1106-70
Adrian Leung, Yingli Sheng, Haitham Cruickshank, The security challenges for mobile ubiquitous services Information Security Technical Report. ,vol. 12, pp. 162- 171 ,(2007) , 10.1016/J.ISTR.2007.05.001
Abhijit Bose, Kang G. Shin, On Mobile Viruses Exploiting Messaging and Bluetooth Services 2006 Securecomm and Workshops. pp. 1- 10 ,(2006) , 10.1109/SECCOMW.2006.359562
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, C. Glezer, Google Android: A Comprehensive Security Assessment ieee symposium on security and privacy. ,vol. 8, pp. 35- 44 ,(2010) , 10.1109/MSP.2010.2