作者: Stelios Dritsas , Dimitris Gritzalis , Alexios Mylonas , Bill Tsoumas
DOI:
关键词:
摘要: The adoption of smartphones, devices transforming from simple communication to ‘smart’ and multipurpose devices, is constantly increasing. Amongst the main reasons are their small size, enhanced functionality ability host many useful attractive applications. However, this vast use mobile platforms makes them an target for conducting privacy security attacks. This scenario increases risk introduced by these attacks personal given that smartphones as business tools may extend perimeter organization's IT infrastructure. Furthermore, smartphone provide application developers with rich capabilities, which can be used compromise device holder her environment (private and/or organizational). paper examines feasibility malware development in average programmers have access official programming libraries provided platforms. Towards direction we initially propose specific evaluation criteria assessing level well-known (i.e. Android, BlackBerry, Apple iOS, Symbian, Windows Mobile), terms malware. In sequel, a comparative analysis, based on proof concept study, implementation distribution location tracking attempted. Our study has proven that, under circumstances, all could attack vectors, harvesting data without users knowledge consent.