A Survey on Smartphone Security

Article Preview

Abstract:

This paper proposes a survey on smartphone security from the aspect of mobile malware, specifications related to smartphone security, and smartphone security solutions. The contribution of this paper helps people to quickly know about definition of malware, attack channels and black industry chain of smartphone security, international and domestic mobile security specification, and smartphone security solutions by security vendors.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3861-3865

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] J. Chen, M. Fan, Signatures extraction method based on classification of malicious software, Journal of Computer Applications vol. 31 Suppl. 1, pp.83-85, (2011).

Google Scholar

[2] NetQin mobile phone security report on May 2011, NetQin Inc., (2011).

Google Scholar

[3] Operator guide to mobile malware, GSM Assoiction Offical Document SG19, Dec, (2008).

Google Scholar

[4] Remote Mobile Malware Removal Study, GSM Assoiction Offical Document GSON6, May, (2011).

Google Scholar

[5] The Mobile device security patching, GSM Assoiction Offical Document SG26, Apr, (2012).

Google Scholar

[6] 360 security center, URL: http: /www. 360. cn.

Google Scholar

[7] Authorization Framework for Network APIs, Version 1. 0, Open Mobile Allianc, OMA-ER-Autho4API-V1_0, URL: http: /www. openmobilealliance. org.

Google Scholar

[8] NetQin security, URL: http: /cn. nq. com.

Google Scholar

[9] Kingsoft handset bodyguard, URL: http: /m. ijinshan. com.

Google Scholar

[10] ITU-T SG17: Security Group. URL: http: /www. itu. int/en/ITU-T/studygroups/2013-2016/17/Pages/default. aspx.

Google Scholar

[11] Study of the mobile security threats and solutions, CCSA TC8 WG2 Offical Document, (2011).

Google Scholar

[12] The mobile malicious software defense scheme, CCSA TC11 WG2 Offical Document, (2011).

Google Scholar

[13] The information security technical requirements of mobile terminals, CCSA TC11 WG2 Offical Document, (2012).

Google Scholar

[14] The OAuth 2. 0 Authorization Protocol, URL: https: /datatracker. ietf. org/doc/draft-ietf-oauth-v2.

Google Scholar

[15] Rising security , URL: http: /www. rising. com. cn.

Google Scholar

[16] Mobile spam report, Version 1. 0, Open Mobile Allianc, OMA-ER-SpamReport-V1_0, URL: http: /www. openmobilealliance. org.

Google Scholar