fbpx
Wikipedia

Mobile security

Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing.[1] It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern.[2]

Increasingly, users and businesses use smartphones not only to communicate, but also to plan and organize their work and private life. Within companies, these technologies are causing profound changes in the organization of information systems and have therefore become the source of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company.

The majority of attacks are aimed at smartphones.[citation needed] These attacks take advantage of vulnerabilities discovered in smartphones that can result from different modes of communication, including Short Message Service (SMS, text messaging), Multimedia Messaging Service (MMS), wireless connections, Bluetooth, and GSM, the de facto international standard for mobile communications. Smartphone operating systems or browsers are another weakness. Some malware makes use of the common user's limited knowledge. Only 2.1% of users reported having first-hand contact with mobile malware, according to a 2008 McAfee study, which found that 11.6% of users had heard of someone else being harmed by the problem. Yet, it is predicted that this number will rise.[3]

Security countermeasures are being developed and applied to smartphones, from security best practices in software to the dissemination of information to end users. Countermeasures can be implemented at all levels, including operating system development, software design, and user behavior modifications.

Challenges of smartphone mobile security edit

Threats edit

A smartphone user is exposed to various threats when they use their phone. In just the last two quarters of 2012, the number of unique mobile threats grew by 261%, according to ABI Research.[3] These threats can disrupt the operation of the smartphone and transmit or modify user data. Applications must guarantee privacy and integrity of the information they handle. In addition, since some apps could themselves be malware, their functionality and activities should be limited (for example, restricting the apps from accessing location information via the Global Positioning System (GPS), blocking access to the user's address book, preventing the transmission of data on the network, or sending SMS messages that are billed to the user).[1] Malicious apps can also be installed without the owners' permission or knowledge.

Vulnerability in mobile devices refers to aspects of system security that are susceptible to attacks. A vulnerability occurs when there is system weakness, an attacker has access to the weakness, and the attacker has competency to exploit the weakness.[1]

Potential attackers began looking for vulnerabilities when Apple's iPhone and the first Android devices came onto the market. Since the introduction of apps (particularly mobile banking apps), which are vital targets for hackers, malware has been rampant. The Department of Homeland Security's cybersecurity department claims that the number of vulnerable points in smartphone operating systems has increased.[when?] As mobile phones are connected to utilities and appliances, hackers, cybercriminals, and even intelligence officials have access to these devices.[4]

Starting in 2011, it became increasingly popular to let employees use their own devices for work-related purposes. The Crowd Research Partners study, published in 2017, reports that during 2017, most businesses that mandated the use of mobile devices were subjected to malware attacks and breaches. It has become common for rogue applications to be installed on user devices without the user's permission. They breach privacy, which hinders the effectiveness of the devices.[citation needed][clarification needed]

Since the recent rise of mobile attacks, hackers have increasingly targeted smartphones through credential theft and snooping. The number of attacks targeting smartphones and other devices has risen by 50 percent.[citation needed] According to the study,[which?] mobile banking applications are responsible for the increase in attacks.

Malware—such as ransomware, worms, botnets, Trojans, and viruses—have been developed to exploit vulnerabilities in mobile devices. Malware is distributed by attackers so they can gain access to private information or digitally harm a user. For example, should malware breach a user's banking service, it may be able to access their transaction information, their rights to log in, and their money. Some malware is developed with anti-detection techniques to avoid detection. Attackers who use malware can avoid detection by hiding malicious code.

Trojan-droppers can also avoid detection of malware. Despite the fact that the malware inside a device does not change, the dropper generates new hashes each time. Additionally, droppers can also create a multitude of files, which can lead to the creation of viruses. Android mobile devices are prone to Trojan-droppers. The banking Trojans also enable attacks on the banking applications on the phone, which leads to the theft of data for use in stealing money and funds.[clarification needed]

Jailbreaks for iOS devices work by disabling the signing of codes on iPhones so that applications not downloaded from the App Store can be operated. In this way, all the protection layers offered by iOS are disrupted, exposing the device to malware. These outside applications don't run in a sandbox, which exposes potential security problems. Some attack vectors change the mobile devices' configuration settings by installing malicious credentials and virtual private networks (VPNs) to direct information to malicious systems. In addition, spyware can be installed on mobile devices in order to track an individual.

Triade malware comes pre-installed on some mobile devices. In addition to Haddad, there is Lotoor, which exploits vulnerabilities in the system to repackage legitimate applications.[5] The devices are also vulnerable due to spyware and leaky behaviors through applications. Mobile devices are also effective conveyance systems for malware threats, breaches of information, and thefts.

Wi-Fi interference technologies can also attack mobile devices through potentially insecure networks. By compromising the network, hackers are able to gain access to key data. Devices connected to public networks are at risk of attacks. A VPN, on the other hand, can be used to secure networks. As soon as a system is threatened, an active VPN will operate. There are also social engineering techniques, such as phishing, in which unsuspecting victims are sent links to lead them to malicious websites. The attackers can then hack into the victim's device and copy all of its information.

Some mobile device attacks can be prevented. For example, containerization allows the creation of a hardware infrastructure that separates business data from other data. Additionally, network protection detects malicious traffic and rogue access points. Data security is also ensured through authentication.[1]

There are a number of threats to mobile devices, including annoyance, stealing money, invading privacy, propagation, and malicious tools.[6] There are three prime targets for attackers:[7]

  1. Data – Smartphones are devices for data management and may contain sensitive data like credit card numbers, authentication information, private information, activity logs (calendar, call logs).
  2. Identity – Smartphones are highly customizable, so the device or its contents can easily be associated with a specific person.
  3. Availability – Attacking a smartphone can limit or deprive a user's access to it.

Attacks on mobile security systems include:

  • Botnets – Attackers infect multiple machines with malware that victims generally acquire via e-mail attachments or from compromised applications or websites. The malware then gives hackers remote control of "zombie" devices, which can then be instructed to perform harmful acts.[6]
  • Malicious applications – Hackers upload malicious programs or games to third-party smartphone application marketplaces. The programs steal personal information and open backdoor communication channels to install additional applications and cause other problems.[6]
  • Malicious links on social networks – An effective way to spread malware where hackers can place Trojans, spyware, and backdoors.[6]
  • Spyware – Hackers use this to hijack phones, allowing them to hear calls, see text messages and e-mails, and track a user's location through GPS updates.[6]

The source of these attacks are the same actors found in the non-mobile computing space:[7]

  • Professionals, whether commercial or military, who focus on the three targets mentioned above. They steal sensitive data from the general public, as well as undertake industrial espionage. They will also use the identity of those attacked to achieve other attacks.
  • Thieves who want to gain income through data or identities they have stolen. The thieves will attack many people to increase their potential income.
  • Black hat hackers who specifically attack availability.[8][failed verification] Their goal is to develop viruses, and cause damage to the device.[9][failed verification] In some cases, hackers have an interest in stealing data on devices.
  • Grey hat hackers who reveal vulnerabilities.[10] Their goal is to expose vulnerabilities of the device.[11] Grey hat hackers do not intend on damaging the device or stealing data. [12]

Consequences edit

When a smartphone is infected by an attacker, the attacker can attempt several things:

  • The attacker can manipulate the smartphone as a zombie machine: a machine with which the attacker can communicate and send commands which will be used to send unsolicited messages (spam) via SMS or email.[13]
  • The attacker can easily force the smartphone to make phone calls. For example, one can use the API (library that contains the basic functions not present in the smartphone) PhoneMakeCall by Microsoft, which collects telephone numbers from any source (such as yellow pages) and then calls them.[13] The attacker can use this method to call paid services, resulting in charges to the smartphone owner. Dangerously, the smartphone could call and disrupt emergency services.[13]
  • A compromised smartphone can record conversations between the user and others and send them to a third party.[13] This can cause user privacy and industrial security problems.
  • An attacker can also steal a user's identity, usurp their identity (with a copy of the user's SIM card or even the telephone itself), and thus impersonate the owner. This raises security concerns in countries where smartphones can be used to place orders, view bank accounts, or are used as an identity card.[13]
  • The attacker can reduce the usability of the smartphone, by discharging the battery.[14] For example, they can launch an application that will run continuously on the smartphone processor, requiring a lot of energy and draining the battery. Frank Stajano and Ross Anderson first described this form of attack, calling it an attack of "battery exhaustion" or "sleep deprivation torture".[15]
  • The attacker can make the smartphone unusable.[16] This attack can delete the boot scripts, resulting in a phone without a functioning operating system; modify certain files to make it unusable, such as a script that launches at startup that forces the smartphone to restart; or embed a startup application that will empty the battery.[15]
  • The attacker can remove the user's data, whether personal (photos, music, videos) or professional (contacts, calendars, notes).[16]

Attacks based on communication edit

Attacks based on SMS and MMS edit

Some attacks derive from flaws in the management of Short Message Service (SMS) and Multimedia Messaging Service (MMS).

Some mobile phone models have problems in managing binary SMS messages. By sending an ill-formed block, it is possible to cause the phone to restart, leading to the denial-of-service attacks. If a user with a Siemens S55 received a text message containing a Chinese character, it would lead to a denial of service.[17] In another case, while the standard requires that the maximum size of a Nokia Mail address is 32 characters, some Nokia phones did not verify this standard, so if a user enters an email address over 32 characters, that leads to complete dysfunction of the e-mail handler and puts it out of commission. This attack is called "curse of silence". A study on the safety of the SMS infrastructure revealed that SMS messages sent from the Internet can be used to perform a distributed denial of service (DDoS) attack against the mobile telecommunications infrastructure of a big city. The attack exploits the delays in the delivery of messages to overload the network.

Another potential attack could begin with a phone that sends an MMS to other phones, with an attachment. This attachment is infected with a virus. Upon receipt of the MMS, the user can choose to open the attachment. If it is opened, the phone is infected, and the virus sends an MMS with an infected attachment to all the contacts in the address book. There is a real-world example of this attack: the virus Commwarrior[16] sends MMS messages (including an infected file) to all recipients in a mobile phone's address book. If a recipient installs the infected file, the virus repeats, sending messages to recipients taken from the new address book.

Attacks based on communication networks edit

GSM networks edit

The attacker may try to break the encryption of a GSM mobile network. The network encryption algorithms belong to the family of algorithms called A5. Due to the policy of security through obscurity, it has not been possible to openly test the robustness of these algorithms. There were originally two variants of the algorithm: A5/1 and A5/2 (stream ciphers), where the former was designed to be relatively strong, and the latter was purposely designed to be weak to allow easy cryptanalysis and eavesdropping. ETSI forced some countries (typically outside Europe) to use A5/2. Since the encryption algorithm was made public, it was proved to be breakable: A5/2 could be broken on the fly, and A5/1 in about 6 hours.[18] In July 2007, the 3GPP approved a change request to prohibit the implementation of A5/2 in any new mobile phones, decommissioning the algorithm; it is no longer implemented in mobile phones.

Stronger public algorithms have been added to the GSM standard: the A5/3 and A5/4 (Block ciphers), otherwise known as KASUMI or UEA1[19] published by ETSI. If the network does not support A5/1, or any other A5 algorithm implemented by the phone, then the base station can specify A5/0 which is the null algorithm, whereby the radio traffic is sent unencrypted. Even if mobile phones are able to use 3G or 4G (which have much stronger encryption than 2G GSM), the base station can downgrade the radio communication to 2G GSM and specify A5/0 (no encryption).[20] This is the basis for eavesdropping attacks on mobile radio networks using a fake base station commonly called an IMSI catcher.

In addition, tracing of mobile terminals is difficult since each time the mobile terminal is accessing or being accessed by the network, a new temporary identity (TMSI) is allocated to the mobile terminal. The TMSI is used as the identity of the mobile terminal the next time it accesses the network. The TMSI is sent to the mobile terminal in encrypted messages.[citation needed]

Once the encryption algorithm of GSM is broken, the attacker can intercept all unencrypted communications made by the victim's smartphone.

Wi-Fi edit

 
Access Point spoofing

An attacker can try to eavesdrop on Wi-Fi communications to derive information (e.g., username, password). This type of attack is not unique to smartphones, but they are very vulnerable to these attacks because often Wi-Fi is their only means of communication and access the internet. The security of wireless networks (WLAN) is thus an important subject.

Initially, wireless networks were secured by WEP keys. The weakness of WEP is its short encryption key, which is the same for all connected clients. In addition, several reductions in the search space of the keys have been found by researchers. Now, most wireless networks are protected by the WPA security protocol. WPA is based on the Temporal Key Integrity Protocol (TKIP), which was designed to allow migration from WEP to WPA on the equipment already deployed. The major improvements in security are the dynamic encryption keys. For small networks, the WPA uses a "pre-shared key" which is based on a shared key. Encryption can be vulnerable if the length of the shared key is short. With limited opportunities for input (i.e., only the numeric keypad), mobile phone users might define short encryption keys that contain only numbers. This increases the likelihood that an attacker succeeds with a brute-force attack. The successor to WPA, called WPA2, is supposed to be safe enough to withstand a brute force attack.

The ability to access free and fast Wi-Fi gives a business an edge over those who do not. Free Wi-Fi is usually provided by organizations such as airports, coffee shops, and restaurants for a number of reasons, including encouraging customers to spend more time and money on the premises, and helping users stay productive.[1] Another reason is enhancing customer tracking: many restaurants and coffee shops compile data about their customers so they can target advertisements directly to their devices.[citation needed] This means that customers know what services the facility provides. Generally, individuals filter business premises based on Internet connections as another reason to gain a competitive edge. Network security is the responsibility of the organizations, as unsecured Wi-Fi networks are prone to numerous risks. The man-in-the-middle attack entails the interception and modification of data between parties. Additionally, malware can be distributed via the free Wi-Fi network and hackers can exploit software vulnerabilities to smuggle malware onto connected devices. It is also possible to eavesdrop and sniff Wi-Fi signals using special software and devices, capturing login credentials and hijacking accounts.[9]

As with GSM, if the attacker succeeds in breaking the identification key, both the phone and the entire network it is connected to become exposed to attacks.

Many smartphones remember wireless LANs they have previously connected to, allowing users to not have to re-identify with each connection. However, an attacker could create a Wi-Fi access point twin with the same parameters and characteristics as a real network. By automatically connecting to the fraudulent network, a smartphone becomes susceptible to the attacker, who can intercept any unencrypted data.[21]

Lasco is a worm that initially infects a remote device using the SIS file format,[22] a type of script file that can be executed by the system without user interaction. The smartphone thus believes the file to come from a trusted source and downloads it, infecting the machine.[22]

Bluetooth edit

Security issues related to Bluetooth on mobile devices have been studied and have shown numerous problems on different phones. One easy to exploit vulnerability is that unregistered services do not require authentication, and vulnerable applications have a virtual serial port used to control the phone. An attacker only needed to connect to the port to take full control of the device.[23]

In another example, an attacker sends a file via Bluetooth to a phone within range with Bluetooth in discovery mode. If the recipient accepts, a virus is transmitted. An example of this is a worm called Cabir.[16] The worm searches for nearby phones with Bluetooth in discoverable mode and sends itself to the target device. The user must accept the incoming file and install the program, after which the worm infects the machine.

Attacks based on vulnerabilities in software applications edit

Other attacks are based on flaws in the OS or applications on the phone.

Web browser edit

The mobile web browser is an emerging attack vector for mobile devices. Just as common Web browsers, mobile web browsers are extended from pure web navigation with widgets and plug-ins or are completely native mobile browsers.

Jailbreaking the iPhone with firmware 1.1.1 was based entirely on vulnerabilities on the web browser.[24] In this case, there was a vulnerability based on a stack-based buffer overflow in a library used by the web browser (LibTIFF). A similar vulnerability in the web browser for Android was discovered in October 2008.[25] Like the iPhone vulnerability, it was due to an obsolete and vulnerable library, but significantly differed in that Android's sandboxing architecture limited the effects of this vulnerability to the Web browser process.

Smartphones are also victims of classic Web piracy such as phishing, malicious websites, and background-running software. The big difference is that smartphones do not yet have strong antivirus software available.[26][failed verification]

The Internet offers numerous interactive features that ensure a higher engagement rate, capture more and relevant data, and increase brand loyalty. Blogs, forums, social networks, and wikis are some of the most common interactive websites. Due to the tremendous growth of the Internet, there has been a rapid rise in the number of security breaches experienced by individuals and businesses.

Mobile browser users can balance usage and caution in several ways,[27] such as reviewing computer security regularly, using secure and secret passwords, and correcting, upgrading, and replacing the necessary features. Installation of antivirus and anti-spyware programs is the most effective way of protecting the computer, as they offer protection against malware, spyware, and viruses. Additionally, they use firewalls, which are typically installed between trusted networks or devices and the Internet. By acting as a web server, the firewall prevents external users from accessing the internal computer system.[28][failed verification]

Operating system edit

Sometimes it is possible to overcome the security safeguards by modifying the operating system (OS) itself, such as the manipulation of firmware and malicious signature certificates. These attacks are difficult.

In 2004, vulnerabilities in virtual machines running on certain devices were revealed. It was possible to bypass the bytecode verifier and access the native underlying operating system.[3] The results of this research were not published in detail. The firmware security of Nokia's Symbian Platform Security Architecture (PSA) is based on a central configuration file called SWIPolicy. In 2008, it was possible to manipulate the Nokia firmware before it was installed. In fact, some downloadable versions of this file were human-readable, so it was possible to modify and change the image of the firmware. [29] This vulnerability was solved by an update from Nokia.

In theory, smartphones have an advantage over hard drives since the OS files are in read-only memory (ROM) and cannot be changed by malware. However, in some systems it was possible to circumvent this: in the Symbian OS, it was possible to overwrite a file with a file of the same name.[29] On the Windows OS, it was possible to change a pointer from a general configuration file to an editable file.

When an application is installed, the signing of this application is verified by a series of certificates. One can create a valid signature without using a valid certificate and add it to the list.[30] In the Symbian OS, all certificates are in the directory c:\resource\swicertstore\dat. With firmware changes explained above, it is very easy to insert a seemingly valid but malicious certificate.

Android is the OS that has been attacked the most, because it has the largest userbase. A cybersecurity company[which?] reported to have blocked about 18 million attacks in 2016.[31]

Attacks based on hardware vulnerabilities edit

Electromagnetic waveforms edit

In 2015, researchers at the French government agency Agence nationale de la sécurité des systèmes d'information (ANSSI, lit.'French National Agency for the Security of Information Systems') demonstrated the capability to trigger the voice interface of certain smartphones remotely by using "specific electromagnetic waveforms".[4] The exploit took advantage of antenna-properties of headphone wires while plugged into the audio-output jacks of the vulnerable smartphones and effectively spoofed audio input to inject commands via the audio interface.[4]

Juice jacking edit

Juice jacking is a physical or hardware vulnerability specific to mobile platforms. Utilizing the dual purpose of the USB charge port, many devices have been susceptible to having data exfiltrated from, or malware installed onto, a mobile device by utilizing malicious charging kiosks set up in public places or hidden in normal charge adapters.

Jailbreaking and rooting edit

Jailbreaking is also a physical access vulnerability, in which a mobile device user hacks into device to unlock it, exploiting weaknesses in the operating system. Mobile device users take control of their own device by jailbreaking it, allowing them to customize the interface by installing applications, change system settings that are not allowed on the devices, tweak OS processes, and run uncertified programs. This openness exposes the device to a variety of malicious attacks which can compromise private data.[5]

Password cracking edit

In 2010, researchers from the University of Pennsylvania investigated the possibility of cracking a device's password through a smudge attack (literally imaging the finger smudges on the screen to discern the user's password).[27] The researchers were able to discern the device password up to 68% of the time under certain conditions.[27] Outsiders may perform over-the-shoulder surveillance on victims, such as watching specific keystrokes or pattern gestures, to unlock device password or passcode.

Malicious software (malware) edit

 
Malware types based on number of infected smartphones (2009)[32]

As smartphones are a permanent point of access to the Internet (they are often turned on), they can be compromised with malware as easily as computers. A malware is a computer program that aims to harm the system in which it resides.

Trojans, worms and viruses are all considered malware. A Trojan is a program on a device that allows external users to connect discreetly. A worm is a program that reproduces on multiple computers across a network. A virus is a malicious software designed to spread to other computers by inserting itself into legitimate programs and running programs in parallel.

Malware is far less numerous and serious to smartphones as it is to computers. Nonetheless, recent studies show that the evolution of malware in smartphones have rocketed in the last few years posing a threat to analysis and detection.[25] In 2017, mobile malware variants increased by 54%.[33]

Problematic common apps and pre-installed software edit

Various common apps installed by millions can intrude on privacy, even if they were installed from a trusted software distribution service like the Google Play Store. For example, in 2022 it was shown that the popular app TikTok collects a lot of data and is required to make it available to the Chinese Communist Party (CCP) due to a national security law. This includes personal information on millions of Americans.

The firmware and "stock software" preinstalled on devices – and updated with preinstalled software – can also have undesired components or privacy-intruding default configurations or substantial security vulnerabilities. In 2019, Kryptowire identified Android devices with malicious firmware that collected and transmitted sensitive data without users' consent.

Analysis of data traffic by popular smartphones running variants of Android found substantial by-default data collection and sharing with no opt-out by pre-installed software.[34][35] This issue also can't be addressed by conventional security patches. Outgoing Internet traffic can be analyzed with packet analyzers and with firewall apps like the NetGuard firewall app for Android that allows reading blocked traffic logs.[36][additional citation(s) needed]

Malware attacks edit

Typically, an attack on a smartphone made by malware takes place in three phases: the infection of a host, the accomplishment of its goal, and the spread of the malware to other systems. Malware often uses the resources offered by infected smartphones. It will use the output devices such as Bluetooth or infrared, but it may also use the address book or email address of the person to infect the user's acquaintances. The malware exploits the trust that is given to data sent by an acquaintance.

Infection edit

Infection is the method used by malware to gain access to the smartphone; it may exploit an internal vulnerability or rely on the gullibility of the user. Infections are classified into four classes according to their degree of user interaction:[37]

  1. Explicit permission – The most benign interaction is to ask the user if it is allowed to infect the machine, clearly indicating its potential malicious behavior. This is typical behavior of a proof of concept malware.
  2. Implied permission – This infection is based on the fact that the user has a habit of installing software. Most Trojans try to seduce the user into installing attractive applications (like games or useful applications) that actually contain malware.
  3. Common interaction – This infection is related to a common behavior, such as opening an MMS or email.
  4. No interaction – The device is infected without the user taking action. This class of infection is the most dangerous, as it is both unapproved and automatic.

Accomplishment of its goal

Once the malware has infected a phone, it will also seek to accomplish its goal, which is usually one of the following:[38]

  • Monetary damages – The attacker can steal user data and either sell them to the same user or sell to a third party.
  • Data or device damage – Malware can partially damage the device or delete or modify data on the device.
  • Concealed damage – The two aforementioned types of damage are detectable, but the malware can also leave a backdoor for future attacks or even conduct wiretaps.

Spread to other systems edit

Once the malware has infected a smartphone, it aims to spread to a new host.[39] This usually occurs to proximate devices via Wi-Fi, Bluetooth, or infrared; or to remote networks via telephone calls, SMS, or emails.

 
Diagram (in French) which ranks common smartphone malware behaviors by frequency.[32] At least 50 malware varieties exhibit no negative behavior, except their ability to spread.[32]

Examples edit

Viruses and Trojans edit

  • Cabir (also known as Caribe, SybmOS/Cabir, Symbian/Cabir, and EPOC.cabir) is the name of a computer worm developed in 2004, designed to infect mobile phones running Symbian OS. It is believed to have been the first computer worm able to infect mobile phones.
  • Commwarrior, created on March 7, 2005, was the first worm able to infect many machines from MMS.[16] It is sent as COMMWARRIOR.ZIP containing the file COMMWARRIOR.SIS. When this file is executed, Commwarrior attempts to connect to nearby devices by Bluetooth or infrared under a random name. It then attempts to send MMS message to the contacts in the smartphone with different header messages for each person, who receive the MMS and often open them without further verification.
  • Phage was the first Palm OS virus discovered.[16] It transfers to the Palm from a PC via synchronization. It infects all applications in the smartphone and embeds its own code to function without the user and the system detecting it. From the system's perspective, all the applications behave as expected.
  • RedBrowser is a Trojan based on Java.[16] The Trojan masquerades as a program called "RedBrowser" which allows the user to visit WAP sites without a WAP connection. During application installation, the user sees a request on their phone that the application needs permission to send messages. If the user accepts, RedBrowser can send SMS to paid call centers. This program uses the smartphone's connection to social networks (e.g., Facebook, Twitter) to get the contact information for the user's acquaintances (provided the required permissions have been given) and will send them messages.
  • WinCE.PmCryptic.A is a malicious software on Windows Mobile which aims to earn money for its authors. It uses the infestation of memory cards that are inserted in the smartphone to spread more effectively. [40]
  • CardTrap is a virus that is available on different types of smartphones, which aims to deactivate the system and third-party applications. It works by replacing the files used to start the smartphone and applications to prevent them from executing.[41] There are different variants of this virus such as Cardtrap.A for SymbOS devices. It also infects the memory card with malware capable of infecting Windows.
  • Ghost Push is malicious software on Android OS which automatically roots the Android device and installs malicious applications directly to system partition. It then unroots the device to prevent users from removing the threat by master reset (the threat can be removed only by reflashing). It cripples the system resources, executes quickly, and is hard to detect.

Ransomware edit

Mobile ransomware is a type of malware that locks users out of their mobile devices in a pay-to-unlock-your-device ploy. It has significantly grown as a threat category since 2014.[42] Mobile users are often less security-conscious – particularly as it pertains to scrutinizing applications and web links – and trust the mobile device's native protection capability.

Mobile ransomware poses a significant threat to businesses reliant on instant access and availability of their proprietary information and contacts. The likelihood of a traveling businessman paying a ransom to unlock their device is significantly higher since they are at a disadvantage given inconveniences such as timeliness and less direct access to IT staff. Recent ransomware attacks have caused many Internet-connected devices to not work and are costly for companies to recover from.

Spyware edit

  • Pegasus – In 2021, journalists and researchers reported the discovery of spyware developed and distributed by a private company which can and has been used to infect both iOS and Android smartphones often – partly via use of 0-day exploits – without the need for any user-interaction or significant clues to the user. The spyware is then used to exfiltrate data, track user locations, capture film through its camera, and activate the microphone at any time.[43]
  • Flexispy is a Symbian application that can be considered a Trojan. The program sends all information received and sent from the smartphone to a Flexispy server. It was originally created to protect children and spy on adulterous spouses.[16][28]

Portability of malware across platforms edit

Attackers can make their malware target multiple platforms. Some malware attacks operating systems but is able to spread across different systems.

To begin with, malware can use runtime environments like Java virtual machine or the .NET Framework. They can also use other libraries present in many operating systems.[44] Some malware carries several executable files in order to run in multiple environments, utilizing these during the propagation process. In practice, this type of malware requires a connection between the two operating systems to use as an attack vector. Memory cards can be used for this purpose, or synchronization software can be used to propagate the virus.

Countermeasures edit

Mobile security is divided into different categories, as methods do not all act at the same level and are designed to prevent different threats. These methods range from the management of security by the operating system (protecting the system from corruption by an application) to the behavioral education of the user (preventing the installation of a suspicious software).

Security in operating systems edit

The first layer of security in a smartphone is the operating system. Beyond needing to handle the usual roles (e.g., resource management, scheduling processes) on the device, it must also establish the protocols for introducing external applications and data without introducing risk.[citation needed]

A central paradigm in mobile operating systems is the idea of a sandbox. Since smartphones are currently designed to accommodate many applications, they must have mechanisms to ensure these applications are safe for the phone itself, for other applications and data on the system, and for the user. If a malicious program reaches a mobile device, the vulnerable area presented by the system must be as small as possible. Sandboxing extends this idea to compartmentalize different processes, preventing them from interacting and damaging each other. Based on the history of operating systems, sandboxing has different implementations. For example, where iOS will focus on limiting access to its public API for applications from the App Store by default, Managed Open In allows you to restrict which apps can access which types of data. Android bases its sandboxing on its legacy of Linux and TrustedBSD.

The following points highlight mechanisms implemented in operating systems, especially Android.

Rootkit detectors
The intrusion of a rootkit in the system is a great danger in the same way as on a computer. It is important to prevent such intrusions, and to be able to detect them as often as possible. Indeed, there is concern that with this type of malicious program, an attacker could partially or completely bypass the device security, or acquire administrator rights. If this happens, nothing prevents the attacker from studying or disabling the safety features that were circumvented, deploying the applications they want, or disseminating a method of intrusion by a rootkit to a wider audience.[45][46]
An example of a defense mechanism against this is the chain of trust (such as in iOS). This mechanism relies on signatures from applications required to start the operating system, and a certificate signed by the manufacturer (Apple). In the event that the signature checks are inconclusive, the device detects this and stops the boot-up.[47] If the operating system is compromised due to jailbreaking, rootkit detection may not work if it is disabled by the jailbreak method or software is loaded after jailbreak disables Rootkit Detection.
Process isolation
Android uses mechanisms of user process isolation inherited from Linux. Each application has a user associated with it, and a tuple (UID, GID). This approach serves as a sandbox: while applications can be malicious, they cannot get out of the sandbox reserved for them by their identifiers, and thus cannot interfere with the proper functioning of the system. For example, since it is impossible for a process to end the process of another user, an application can thus not stop the execution of another application.[45][48][49][50][51]
File permissions
From the legacy of Linux, filesystem permissions mechanisms also help with sandboxing. Permissions prevent a process from editing any files it wants. It is therefore not possible to freely corrupt files necessary for the operation of another application or system. Furthermore, in Android there is the method of locking memory permissions. It is not possible to change the permissions of files installed on the SD card from the phone, and consequently it is impossible to install applications.[52][53][54]
Memory protection
In the same way as on a computer, memory protection prevents privilege escalation. This could occur if a process managed to reach an area allocated to other processes, where it could write in the memory of a process with rights superior to its own (with 'root' in the worst case) and perform actions beyond its permissions. It would suffice to insert function calls are authorized by the privileges of the malicious application.[51]
Development through runtime environments
Software is often developed in high-level languages, which can control what is being done by a running program. For example, Java virtual machines continuously monitor the actions of the execution threads they manage, monitor and assign resources, and prevent malicious actions. Buffer overflows can be prevented by these controls.[55][56][51]

Security software edit

Above the operating system security, there is a layer of security software. This layer is composed of individual components to strengthen various vulnerabilities: prevent malware, intrusions, the identification of a user as a human, and user authentication. It contains software components that have learned from their experience with computer security; however, on smartphones, this software must deal with greater constraints (see limitations).

Antivirus and firewall
An antivirus software can be deployed on a device to verify that it is not infected by a known threat, usually by signature detection software that detects malicious executable files. A mobile antivirus product would scan files and compare them against a database of known mobile malware code signatures.[6]
A firewall, meanwhile, can watch over the existing traffic on the network and ensure that a malicious application does not seek to communicate through it. It may equally verify that an installed application does not seek to establish suspicious communication, which may prevent an intrusion attempt.[57][58][59][46]
Visual notifications
In order to make the user aware of any abnormal actions, such as a call they did not initiate, one can link some functions to a visual notification that is impossible to circumvent. For example, when a call is triggered, the called number should always be displayed. Thus, if a call is triggered by a malicious application, the user can see, and take appropriate action.
Turing test
It is important to confirm certain actions by a user decision. The Turing test is used to distinguish between a human and a virtual user, often in the form of a CAPTCHA.
Biometric identification
Another method to use is biometrics,[60] a technique of identifying a person by means of their morphology (e.g., by recognition of the face or eye) or their behavior (e.g., their signature or way of writing). One advantage of using biometric security is that users can avoid having to remember a password or other secret combination to authenticate and prevent malicious users from accessing their devices. In a system with strong biometric security, only the primary user can access the smartphone.

Resource monitoring in the smartphone edit

Should a malicious application pass the security barriers, it can take the actions for which it was designed. However, this activity can be sometimes detected by monitoring the various resources used on the phone. Depending on the goals of the malware, the consequences of infection are not always the same; all malicious applications are not intended to harm the devices on which they are deployed.[61]

The following resources are only indications and do not provide certainty about the legitimacy of the activity of an application. However, these criteria can help target suspicious applications, especially if several criteria are combined.

Battery
Some malware is aimed at exhausting the energy resources of the phone. Monitoring the energy consumption of the phone can be a way to detect certain malware applications.[45]
Memory usage
Memory usage is inherent in any application. However, if one finds that an unnecessary or unexpected proportion of memory is used by an application, it may be flagged as suspicious.
Network traffic
As part of normal operation on a smartphone, many applications are bound to connect via the network. However, an application using a lot of bandwidth can be strongly suspected of attempting to communicate a lot of information and disseminate data to many other devices. This observation only allows a suspicion, because some legitimate applications can be very resource-intensive in terms of network communications, the best example being streaming video.
Services
One can monitor the activity of various services of a smartphone. During certain moments, some services should not be active, and if one is detected, the application should be suspected. For example, the sending of an SMS when the user is filming video: this communication does not make sense and is suspicious; malware may attempt to send SMS while its activity is masked.[62]

Network surveillance edit

Network traffic exchanged by phones can be monitored. One can place safeguards in network routing points in order to detect abnormal behavior. As the mobile's use of network protocols is much more constrained than that of a computer, expected network data streams can be predicted (e.g., the protocol for sending an SMS), which permits detection of anomalies in mobile networks.[63]

Spam filters
Similar to email exchanges, spam can be detected through means of mobile communications (SMS, MMS). It is therefore possible to detect and minimize this kind of attempt by filters deployed on network infrastructure that is relaying these messages.
Encryption of stored or transmitted information
Because it is always possible that data exchanged can be intercepted, communications and information storage rely on encryption to prevent a malicious entity from using any data obtained during communications. However, this poses the problem of key exchange for encryption algorithms, which requires a secure channel.
Telecom network monitoring
The networks for SMS and MMS exhibit predictable behavior, and there is not as much liberty compared with what one can do with protocols such as TCP or UDP. This implies that one cannot predict the flow of data from common web protocols; a protocol might generate very little traffic by consulting simple pages (rarely) or generate heavy traffic by using video streaming. On the other hand, messages exchanged via mobile phone have a framework and a specific model, and the user does not, in a normal case, have the freedom to intervene in the details of these communications. Therefore, if an abnormality is found in the flux of network data in the mobile networks, the potential threat can be quickly detected.

Manufacturer surveillance edit

In the production and distribution chain for mobile devices, manufacturers are responsibility for ensuring that devices are delivered in a basic configuration without vulnerabilities. Most users are not experts and many of them are not aware of the existence of security vulnerabilities, so the device configuration as provided by manufacturers will be retained by many users. Some smartphone manufacturers add Titan M2s (a security hardware chip) to increase mobile security.[64][65]

Remove debug mode
Phones are sometimes set in a debug mode during manufacturing, but this mode must be disabled before the phone is sold. This mode allows access to features not intended for routine use by a user. Due to the speed of development and production, distractions occur, and some devices are sold in debug mode. This kind of deployment exposes mobile devices to exploits that utilize this oversight.[66][67]
Default settings
When a smartphone is sold, its default settings must be correct, and not leave security gaps. The default configuration is not always changed, so a good initial setup is essential for users. There are, for example, default configurations that are vulnerable to denial-of-service attacks.[45][68]
Security audit of apps
App stores have emerged alongside smartphones. Both users and providers are tasked with examining the immense volume of apps available, from different points of view (e.g., security, content). Security audits should be particularly cautious, because if a fault is not detected, the application can spread very quickly within a few days, and infect a significant number of devices.[45]
Detect suspicious applications demanding rights
When installing applications, it is good to warn the user against sets of permissions that, grouped together, seem potentially dangerous, or at least suspicious. Frameworks like such as Kirin, on Android, attempt to detect and prohibit certain sets of permissions.[69]
Revocation procedures
First developed for Android, a process known as 'remote revocation' can remotely and globally uninstall an application from any device that has it. This means the spread of a malicious application that evaded security checks can be immediately stopped when the threat is discovered.[70][71]
Avoid heavily customized systems
Manufacturers are tempted to overlay custom layers on existing operating systems, with the dual purpose of offering customized options and disabling or charging for certain features. This has the dual effect of risking the introduction of new bugs in the system, coupled with an incentive for users to modify the systems to circumvent the manufacturer's restrictions. These systems are rarely as stable and reliable as the original and may suffer from phishing attempts or other exploits.[citation needed]
Improve software patch processes
New versions of various software components of a smartphone, including operating systems, are regularly published. These 'patches' correct flaws over time. Nevertheless, manufacturers often do not deploy these updates to their devices in a timely fashion, and sometimes not at all. Thus, vulnerabilities can persist when they could be corrected; while they exist and are generally known, they are easily exploitable.[69]

User awareness edit

The user has a large responsibility in the cycle of security. This can be as simple as using a password, or as detailed as precisely controlling which permissions are granted to applications. This precaution is especially important if the user is an employee of a company who stores business data on the device.

Much malicious behavior is allowed by user carelessness. Smartphone users were found to ignore security messages during application installation, especially during application selection and checking application reputation, reviews, security, and agreement messages.[72] A recent survey by internet security experts BullGuard showed a lack of insight concerning the rising number of malicious threats affecting mobile phones, with 53% of users claiming that they are unaware of security software for smartphones. A further 21% argued that such protection was unnecessary, and 42% admitted it hadn't crossed their mind ("Using APA," 2011).[full citation needed] These statistics show that consumers are not concerned about security risks because they believe it is not a serious problem. However, in truth, smartphones are effectively handheld computers and are just as vulnerable.

The following are precautions that a user can take to manage security on a smartphone:

Be skeptical
A user should not believe everything that may be presented, as some information may be wrong, misleading, phishing, or attempting to distribute a malicious application. It is therefore advisable to check an application's reputation before buying or installing it.[73]
Permissions given to applications
The mass distribution of applications necessitates different permissions mechanisms for each operating system. It is necessary to clarify these permissions mechanisms to users, as they differ between systems and can be confusing. In addition, it is rarely feasible (or possible) to modify large sets of permissions requested by an application. However, this can be a source of risk because a user can grant an application excessive rights beyond what is necessary. For example, a note-taking application does not require access to the geolocation service to function. During installation, the user must consider an application's privileges and should not accept the installation if the requested rights are inconsistent.[74][68][75]
Be careful
A user's phone can be protected through simple gestures and precautions, such as locking the smartphone when it is not in use, not leaving the device unattended, not blindly trusting applications, not storing sensitive data, or encrypting sensitive data that cannot be separated from the device.[76][77]
Disconnect unused peripheral devices
According to NIST Guidelines for Managing the Security of Mobile Devices 2013, it is recommended to "Restrict user and application access to hardware, such as the digital camera, GPS, Bluetooth interface, USB interface, and removable storage". This can include removing permissions and configurations for unused peripheral devices.

Enable Android Device Encryption edit

The latest Android[as of?] smartphones come with a built-in encryption setting for securing all the information saved on your device. This makes it difficult for a hacker to extract and decipher the information in case your device is compromised. It can be accessed via: Settings → Security → Encrypt Phone + Encrypt SD Card.
Ensure data
Smartphones have significant memory capacity and can carry several gigabytes of data. The user must be careful about what data it carries and whether they should be protected (such as files containing bank information or business data). The user must have the prudence to avoid the transmission of sensitive data on a smartphone, which can be easily stolen. Furthermore, when a user gets rid of a device, they must be sure to remove all personal data first.[78]

These precautions reduce the ability for people or malicious applications to exploit a user's smartphone. If users are careful, many attacks can be defeated, especially phishing and applications seeking only to obtain rights on a device.

Centralized storage edit

One form of mobile protection allows companies to control the delivery and storage of text messages, by hosting the messages on a company server, rather than on the sender or receiver's phone. When certain conditions are met, such as an expiration date, the messages are deleted.[79]

Limitations edit

The security mechanisms mentioned in this article are to a large extent inherited from knowledge and experience with computer security. The elements composing the two device types are similar, and there are common measures that can be used, such as antivirus software and firewalls. However, the implementation of these solutions is not necessarily possible (or is at least highly constrained) within a mobile device. The reason for this difference is the technical resources available to computers and mobile devices: even though the computing power of smartphones is becoming faster, they have other limitations:

  • Single-task system – Some operating systems, including some still commonly used, are single-tasking. Only the foreground task is executed. It is difficult to introduce applications such as antivirus and firewall on such systems, because they cannot perform their monitoring while the user is operating the device, when monitoring is most needed.
  • Energy autonomy – A critical limitation for smartphones is energy autonomy. It is important that security mechanisms not consume too much battery resources, which could dramatically undermine the smartphone's autonomy and usage.
  • Network – Directly related to battery life, network utilization should not be too high. From the point of view of energy consumption, network utilization is one of the most expensive resources. Nonetheless, some calculations may need to be relocated to remote servers in order to preserve the battery. This balance can make implementation of certain intensive computation mechanisms a delicate situation.[80]

Furthermore, it is common that even if updates exist, or can be developed, they are not always deployed. For example, a user may not be aware of operating system updates; or a user may discover known vulnerabilities that are not corrected until the end of a long development cycle, which allows time to exploit the loopholes.[67]

Next generation of mobile security edit

The following mobile environments are expected to make up future security frameworks:

Rich operating system
This category will contain traditional mobile operating systems like Android, iOS, Symbian OS, or Windows Phone. They will provide the traditional functionality and security of an OS to the applications.
Secure Operating System (Secure OS)
This category features a secure kernel which will run in parallel with a fully featured Rich OS, on the same processor core. It will include drivers for the Rich OS ("normal world") to communicate with the secure kernel ("secure world"). The trusted infrastructure could include interfaces like the display or keypad to regions of PCI-E address space and memories.
Trusted Execution Environment (TEE)
This environment will be made up of hardware and software. It helps control of access rights and houses sensitive applications, which need to be isolated from the Rich OS. It effectively acts as a firewall between the "normal world" and "secure world".
Secure Element (SE)
The SE consists of tamper-resistant hardware and associated software or separate isolated hardware. It can provide high levels of security and work in tandem with the TEE. The SE will be mandatory for hosting proximity payment applications or official electronic signatures. SE may connect, disconnect, block peripheral devices, and operate separate set of hardware.
Security Applications (SA)
Numerous security applications are available on app stores, providing protection from viruses and performing vulnerability assessment.[81]

See also edit

Notes edit

  1. ^ a b c d e "What is mobile security (wireless security)? - Definition from WhatIs.com". WhatIs.com. Retrieved 2020-12-05.
  2. ^ Furnell 2009, p. 13, CHAPTER 1: GETTING MOBILE.
  3. ^ a b c "BYOD and Increased Malware Threats Help Driving Billion Dollar Mobile Security Services Market in 2013". ABI Research. 2013-03-29. Retrieved 2018-11-11.
  4. ^ a b c Kasmi C, Lopes Esteves J (13 August 2015). "IEMI Threats for Information Security: Remote Command Injection on Modern Smartphones". IEEE Transactions on Electromagnetic Compatibility. 57 (6): 1752–1755. doi:10.1109/TEMC.2015.2463089. S2CID 34494009.
    • Andy Greenberg (14 October 2015). "Hackers Can Silently Control Siri From 16 Feet Away". Wired.
  5. ^ a b Michael SW Lee; Ian Soon (2017-06-13). "Taking a bite out of Apple: Jailbreaking and the confluence of brand loyalty, consumer resistance and the co-creation of value". Journal of Product & Brand Management. 26 (4): 351–364. doi:10.1108/JPBM-11-2015-1045. ISSN 1061-0421.
  6. ^ a b c d e f Leavitt, Neal (2011). "Mobile Security: Finally a Serious Problem?". Computer. 44 (6): 11–14. doi:10.1109/MC.2011.184. S2CID 19895938.
  7. ^ a b Bishop 2004.
  8. ^ Olson, Parmy (26 August 2013). "Your smartphone is hackers' next big target". CNN. Retrieved August 26, 2013.
  9. ^ a b (PDF). Mauritius National Computer Board. Archived from the original (PDF) on 2012-11-17.
  10. ^ Lemos, Robert. "New laws make hacking a black-and-white choice". CNET News.com. Retrieved September 23, 2002.
  11. ^ McCaney, Kevin (7 May 2012). . Archived from the original on 2021-01-26. Retrieved May 7, 2012.
  12. ^ Bilton 2010.
  13. ^ a b c d e Guo, Wang & Zhu 2004, p. 3.
  14. ^ Dagon, Martin & Starder 2004, p. 12.
  15. ^ a b Dixon & Mishra 2010, p. 3.
  16. ^ a b c d e f g h Töyssy & Helenius 2006, p. 113.
  17. ^ Siemens 2010, p. 1.
  18. ^ Gendrullis 2008, p. 266.
  19. ^ European Telecommunications Standards Institute 2011, p. 1.
  20. ^ Jøsang, Miralabé & Dallot 2015.
  21. ^ Gittleson, Kim (2014-03-28). "Data-stealing Snoopy drone unveiled at Black Hat". BBC News. Retrieved 2023-10-27.
  22. ^ a b Töyssy & Helenius 2006, p. 27.
  23. ^ Mulliner 2006, p. 113.
  24. ^ Dunham, Abu Nimeh & Becher 2008, p. 225.
  25. ^ a b Suarez-Tangil, Guillermo; Juan E. Tapiador; Pedro Peris-Lopez; Arturo Ribagorda (2014). (PDF). IEEE Communications Surveys & Tutorials. 16 (2): 961–987. doi:10.1109/SURV.2013.101613.00077. S2CID 5627271. Archived from the original (PDF) on 2017-10-31. Retrieved 2013-11-11.
  26. ^ Ng, Alfred. "Your smartphones are getting more valuable for hackers". CNET. Retrieved 2021-03-04.
  27. ^ a b c Aviv, Adam J.; Gibson, Katherine; Mossop, Evan; Blaze, Matt; Smith, Jonathan M. Smudge Attacks on Smartphone Touch Screens (PDF). 4th USENIX Workshop on Offensive Technologies.
  28. ^ a b Hamilton, Keegan (July 11, 2018). "El Chapo's lawyers want to suppress evidence from spyware used to catch cheating spouses". Vice Media. The Thailand-based FlexiSPY bills itself as "the world's most powerful monitoring software," and the company's website lists prospective buyers as concerned parents who want to spy on their kids and companies interested in snooping on their employees. But the app has also been dubbed "stalkerware" because it was initially marketed to jealous spouses paranoid about infidelity.
  29. ^ a b Becher 2009, p. 65.
  30. ^ Becher 2009, p. 66.
  31. ^ Diogenes, Yuri (2019). Cybersecurity - Attack and Defense Strategies - Second Edition. Erdal Ozkaya, Safari Books Online (2nd ed.). Packt. p. 163. ISBN 978-1-83882-779-3. OCLC 1139764053.
  32. ^ a b c Schmidt et al. 2009a, p. 3.
  33. ^ (PDF). Archived from the original (PDF) on 2021-10-09.
  34. ^ "Study reveals scale of data-sharing from Android mobile phones". Trinity College Dublin. Retrieved 16 November 2021.
  35. ^ Liu, Haoyu; Patras, Paul; Leith, Douglas J. (6 October 2021). "Android Mobile OS Snooping By Samsung, Xiaomi, Huawei and Realme Handsets" (PDF). Retrieved 16 November 2021.
  36. ^ "NetGuard FAQ". GitHub. 4 November 2022. Retrieved 4 November 2022.
  37. ^ Becher 2009, p. 87.
  38. ^ Becher 2009, p. 88.
  39. ^ Mickens & Noble 2005, p. 1.
  40. ^ Raboin 2009, p. 272.
  41. ^ Töyssy & Helenius 2006, p. 114.
  42. ^ Haas, Peter D. (2015). (Thesis). Utica College. Archived from the original on 2016-02-24.
  43. ^ "What is Pegasus spyware and how does it hack phones?". The Guardian. 18 July 2021. Retrieved 13 August 2021.
  44. ^ Becher 2009, p. 91-94.
  45. ^ a b c d e Becher 2009, p. 12.
  46. ^ a b Schmidt et al. 2008, p. 5-6.
  47. ^ Halbronn & Sigwald 2010, p. 5-6.
  48. ^ Ruff 2011, p. 127.
  49. ^ Hogben & Dekker 2010, p. 50.
  50. ^ Schmidt et al. 2008, p. 50.
  51. ^ a b c Shabtai et al. 2009, p. 10.
  52. ^ Becher 2009, p. 31.
  53. ^ Schmidt et al. 2008, p. 3.
  54. ^ Shabtai et al. 2009, p. 7-8.
  55. ^ Pandya 2008, p. 15.
  56. ^ Becher 2009, p. 22.
  57. ^ Becher et al. 2011, p. 96.
  58. ^ Becher 2009, p. 128.
  59. ^ Becher 2009, p. 140.
  60. ^ Thirumathyam & Derawi 2010, p. 1.
  61. ^ Schmidt et al. 2008, p. 7-12.
  62. ^ Becher 2009, p. 126.
  63. ^ Malik 2016, p. 28.
  64. ^ Vaughan-Nichols, Steven J. "Google Tensor chip: Everything we know so far". ZDNet.
  65. ^ "The Titan M Chip Powers Up Pixel 3 Security". Wired.
  66. ^ Becher et al. 2011, p. 101.
  67. ^ a b Ruff 2011, p. 11.
  68. ^ a b Hogben & Dekker 2010, p. 45.
  69. ^ a b Becher 2009, p. 13.
  70. ^ Becher 2009, p. 34.
  71. ^ Ruff 2011, p. 7.
  72. ^ Mylonas, Alexios; Kastania, Anastasia; Gritzalis, Dimitris (2013). "Delegate the smartphone user? Security awareness in smartphone platforms". Computers & Security. 34: 47–66. CiteSeerX 10.1.1.717.4352. doi:10.1016/j.cose.2012.11.004.
  73. ^ Hogben & Dekker 2010, p. 46-48.
  74. ^ Ruff 2011, p. 7-8.
  75. ^ Shabtai et al. 2009, p. 8-9.
  76. ^ Hogben & Dekker 2010, p. 43.
  77. ^ Hogben & Dekker 2010, p. 47.
  78. ^ Hogben & Dekker 2010, p. 43-45.
  79. ^ Charlie Sorrel (2010-03-01). "TigerText Deletes Text Messages From Receiver's Phone". Wired. from the original on 2010-08-26. Retrieved 2010-03-02.
  80. ^ Becher 2009, p. 40.
  81. ^ Gupta 2016, p. 461.

References edit

Books edit

  • Bishop, Matt (2004). Introduction to Computer Security. Addison Wesley Professional. ISBN 978-0-321-24744-5.
  • Dunham, Ken; Abu Nimeh, Saeed; Becher, Michael (2008). Mobile Malware Attack and Defense. Syngress Media. ISBN 978-1-59749-298-0.
  • Furnell, Steven (2009). Mobile Security. Itgp. ISBN 978-1-84928-021-1.
  • Rogers, David (2013). Mobile Security: A Guide for Users. Copper Horse Solutions Limited. ISBN 978-1-291-53309-5.

Articles edit

  • Becher, Michael (2009). Security of Smartphones at the Dawn of Their Ubiquitousness (PDF) (Dissertation). Mannheim University.
  • Becher, Michael; Freiling, Felix C.; Hoffmann, Johannes; Holz, Thorsten; Uellenbeck, Sebastian; Wolf, Christopher (May 2011). Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices (PDF). 2011 IEEE Symposium on Security and Privacy. pp. 96–111. doi:10.1109/SP.2011.29. ISBN 978-1-4577-0147-4.
  • Bilton, Nick (26 July 2010). "Hackers With Enigmatic Motives Vex Companies". The New York Times. p. 5.
  • Cai, Fangda; Chen, Hao; Wu, Yuanyi; Zhang, Yuan (2015). AppCracker: Widespread Vulnerabilities in Userand Session Authentication in Mobile Apps (PDF) (Dissertation). University of California, Davis.
  • Crussell, Johnathan; Gibler, Clint; Chen, Hao (2012). Attack of the Clones: Detecting Cloned Applications on Android Markets (PDF) (Dissertation). University of California, Davis.
  • Dagon, David; Martin, Tom; Starder, Thad (October–December 2004). "Mobile Phones as Computing Devices: The Viruses are Coming!". IEEE Pervasive Computing. 3 (4): 11. doi:10.1109/MPRV.2004.21. S2CID 14224399.
  • Dixon, Bryan; Mishra, Shivakant (June–July 2010). On and Rootkit and Malware Detection in Smartphones (PDF). 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W). ISBN 978-1-4244-7728-9.
  • Gendrullis, Timo (November 2008). A real-world attack breaking A5/1 within hours. Proceedings of CHES '08. Springer. pp. 266–282. doi:10.1007/978-3-540-85053-3_17.
  • Gupta, Sugandha (2016). Vulnebdroid: Automated Vulnerability Score Calculator for Android Applications. International Symposium on Security in Computing and Communication. Springer. doi:10.1007/978-981-10-2738-3_40.
  • Guo, Chuanxiong; Wang, Helen; Zhu, Wenwu (November 2004). Smart-Phone Attacks and Defenses (PDF). ACM SIGCOMM HotNets. Association for Computing Machinery, Inc. Retrieved March 31, 2012.
  • Halbronn, Cedric; Sigwald, John (2010). (PDF). HITB SecConf 2010. Archived from the original (PDF) on 2013-02-02. Retrieved 2012-04-21.
  • Hogben, Giles; Dekker, Marnix (December 2010). "Smartphones: Information security Risks, Opportunities and Recommendations for users". ENISA.
  • Jøsang, Audun; Miralabé, Laurent; Dallot, Léonard (2015). "Vulnerability by Design in Mobile Network Security" (PDF). Journal of Information Warfare (JIF). 14 (4). ISSN 1445-3347.
  • Malik, Jyoti (2016). CREDROID: Android malware detection by network traffic analysis. Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing. Association for Computing Machinery, Inc. pp. 28–36. doi:10.1145/2940343.2940348.
  • Mickens, James W.; Noble, Brian D. (2005). Modeling epidemic spreading in mobile environments. WiSe '05 Proceedings of the 4th ACM workshop on Wireless security. Association for Computing Machinery, Inc. pp. 77–86. doi:10.1145/1080793.1080806.
  • Mulliner, Collin Richard (2006). Security of Smart Phones (PDF) (M.Sc. thesis). University of California, Santa Barbara.
  • Pandya, Vaibhav Ranchhoddas (2008). Iphone Security Analysis (PDF) (Thesis). San Jose State University.
  • Raboin, Romain (December 2009). La sécurité des smartphones (PDF). Symposium sur la sécurité des technologies de l'information et des communications 2009. SSTIC09 (in French).
  • Racic, Radmilo; Ma, Denys; Chen, Hao (2006). Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery (PDF) (Dissertation). University of California, Davis.
  • Roth, Volker; Polak, Wolfgang; Rieffel, Eleanor (2008). Simple and Effective Defense Against Evil Twin Access Points. ACM SIGCOMM HotNets. doi:10.1145/1352533.1352569. ISBN 978-1-59593-814-5.
  • Ruff, Nicolas (2011). Sécurité du système Android (PDF). Symposium sur la sécurité des technologies de l'information et des communications 2011. SSTIC11 (in French).
  • Ruggiero, Paul; Foote, Jon (2011). Cyber Threats to Mobile Phones (PDF) (thesis). US-CERT.
  • Schmidt, Aubrey-Derrick; Schmidt, Hans-Gunther; Clausen, Jan; Yüksel, Kamer Ali; Kiraz, Osman; Camtepe, Ahmet; Albayrak, Sahin (October 2008). Enhancing Security of Linux-based Android Devices (PDF). Proceedings of 15th International Linux Kongress.
  • Schmidt, Aubrey-Derrick; Schmidt, Hans-Gunther; Batyuk, Leonid; Clausen, Jan Hendrik; Camtepe, Seyit Ahmet; Albayrak, Sahin (April 2009a). Smartphone Malware Evolution Revisited: Android Next Target? (PDF). 4th International Conference on Malicious and Unwanted Software (MALWARE). ISBN 978-1-4244-5786-1. Retrieved 2010-11-30.
  • Shabtai, Asaf; Fledel, Yuval; Kanonov, Uri; Elovici, Yuval; Dolev, Shlomi (2009). "Google Android: A State-of-the-Art Review of Security Mechanisms". arXiv:0912.5101v1 [cs.CR].
  • Thirumathyam, Rubathas; Derawi, Mohammad O. (2010). Biometric Template Data Protection in Mobile Device Using Environment XML-database. 2010 2nd International Workshop on Security and Communication Networks (IWSCN). ISBN 978-1-4244-6938-3. Archived from the original on 2013-02-12.
  • Töyssy, Sampo; Helenius, Marko (2006). "About malicious software in smartphones". Journal in Computer Virology. 2 (2): 109–119. doi:10.1007/s11416-006-0022-0. S2CID 9760466.

Websites edit

  • European Telecommunications Standards Institute (2011). . Archived from the original on 12 May 2012.
  • Siemens (2010). "Series M Siemens SMS DoS Vulnerability".

Further reading edit

  • "Sécurisation de la mobilité" (PDF). CIGREF (in French). October 2010.
  • Chong, Wei Hoo (November 2007). iDEN Smartphone Embedded Software Testing (PDF). Fourth International Conference on Information Technology, 2007. ITNG '07. doi:10.1109/ITNG.2007.103. ISBN 978-0-7695-2776-5.
  • Jansen, Wayne; Scarfone, Karen (October 2008). "Guidelines on Cell Phone and PDA Security: Recommendations of the National Institute of Standards and Technology" (PDF). National Institute of Standards and Technology. doi:10.6028/NIST.SP.800-124. Retrieved April 21, 2012.
  • Murugiah P. Souppaya; Scarfone, Karen (June 21, 2013). "Guidelines for Managing the Security of Mobile Devices in the Enterprisewebsite=National Institute of Standards and Technology". NIST. doi:10.6028/NIST.SP.800-124r1.
  • Lee, Sung-Min; Suh, Sang-bum; Jeong, Bokdeuk; Mo, Sangdok (January 2008). A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization. 5th IEEE Consumer Communications and Networking Conference, 2008. CCNC 2008. doi:10.1109/ccnc08.2007.63. ISBN 978-1-4244-1456-7.
  • Li, Feng; Yang, Yinying; Wu, Jie (March 2010). CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks (PDF). INFOCOM, 2010 Proceedings IEEE. doi:10.1109/INFCOM.2010.5462113.
  • Ni, Xudong; Yang, Zhimin; Bai, Xiaole; Champion, Adam C.; Xuan, Dong (October 2009). Distribute: Differentiated User Access Control on Smartphones. 6th IEEE International Conference on Mobile Adhoc and Periodic Sensor Systems, 2009. MASS '09. ISBN 978-1-4244-5113-5.
  • Ongtang, Machigar; McLaughlin, Stephen; Enck, William; Mcdaniel, Patrick (December 2009). Semantically Rich Application-Centric Security in Android (PDF). Annual Computer Security Applications Conference, 2009. ACSAC '09. Annual Computer Security Applications Conference (Acsac). ISSN 1063-9527.
  • Schmidt, Aubrey-Derrick; Bye, Rainer; Schmidt, Hans-Gunther; Clausen, Jan; Kiraz, Osman; Yüksel, Kamer A.; Camtepe, Seyit A.; Albayrak, Sahin (2009b). Static Analysis of Executables for Collaborative Malware Detection on Android (PDF). IEEE International Conference Communications, 2009. ICC '09. Communications, 2009. Icc '09. IEEE International Conference on. ISSN 1938-1883.
  • Yang, Feng; Zhou, Xuehai; Jia, Gangyong; Zhang, Qiyuan (2010). A Non-cooperative Game Approach for Intrusion Detection Systems in Smartphone systems. 8th Annual Communication Networks and Services Research Conference. doi:10.1109/CNSR.2010.24. ISBN 978-1-4244-6248-3.

mobile, security, this, article, about, security, threats, mobile, devices, using, mobile, devices, secure, system, access, computer, security, hardware, protection, mechanisms, mobile, device, security, protection, smartphones, tablets, laptops, from, threats. This article is about security threats to mobile devices For using mobile devices for secure system access see Computer security Hardware protection mechanisms Mobile security or mobile device security is the protection of smartphones tablets and laptops from threats associated with wireless computing 1 It has become increasingly important in mobile computing The security of personal and business information now stored on smartphones is of particular concern 2 Increasingly users and businesses use smartphones not only to communicate but also to plan and organize their work and private life Within companies these technologies are causing profound changes in the organization of information systems and have therefore become the source of new risks Indeed smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company The majority of attacks are aimed at smartphones citation needed These attacks take advantage of vulnerabilities discovered in smartphones that can result from different modes of communication including Short Message Service SMS text messaging Multimedia Messaging Service MMS wireless connections Bluetooth and GSM the de facto international standard for mobile communications Smartphone operating systems or browsers are another weakness Some malware makes use of the common user s limited knowledge Only 2 1 of users reported having first hand contact with mobile malware according to a 2008 McAfee study which found that 11 6 of users had heard of someone else being harmed by the problem Yet it is predicted that this number will rise 3 Security countermeasures are being developed and applied to smartphones from security best practices in software to the dissemination of information to end users Countermeasures can be implemented at all levels including operating system development software design and user behavior modifications Contents 1 Challenges of smartphone mobile security 1 1 Threats 1 2 Consequences 2 Attacks based on communication 2 1 Attacks based on SMS and MMS 2 2 Attacks based on communication networks 2 2 1 GSM networks 2 2 2 Wi Fi 2 2 3 Bluetooth 3 Attacks based on vulnerabilities in software applications 3 1 Web browser 3 2 Operating system 4 Attacks based on hardware vulnerabilities 4 1 Electromagnetic waveforms 4 2 Juice jacking 4 3 Jailbreaking and rooting 5 Password cracking 6 Malicious software malware 6 1 Problematic common apps and pre installed software 6 2 Malware attacks 6 2 1 Infection 6 2 2 Spread to other systems 6 3 Examples 6 3 1 Viruses and Trojans 6 3 2 Ransomware 6 3 3 Spyware 6 4 Portability of malware across platforms 7 Countermeasures 7 1 Security in operating systems 7 2 Security software 7 3 Resource monitoring in the smartphone 7 4 Network surveillance 7 5 Manufacturer surveillance 7 6 User awareness 7 6 1 Enable Android Device Encryption 7 7 Centralized storage 7 8 Limitations 7 9 Next generation of mobile security 8 See also 9 Notes 10 References 10 1 Books 10 2 Articles 10 3 Websites 11 Further readingChallenges of smartphone mobile security editThreats edit This section needs additional citations for verification Please help improve this article by adding citations to reliable sources in this section Unsourced material may be challenged and removed Find sources Mobile security news newspapers books scholar JSTOR October 2023 Learn how and when to remove this message A smartphone user is exposed to various threats when they use their phone In just the last two quarters of 2012 the number of unique mobile threats grew by 261 according to ABI Research 3 These threats can disrupt the operation of the smartphone and transmit or modify user data Applications must guarantee privacy and integrity of the information they handle In addition since some apps could themselves be malware their functionality and activities should be limited for example restricting the apps from accessing location information via the Global Positioning System GPS blocking access to the user s address book preventing the transmission of data on the network or sending SMS messages that are billed to the user 1 Malicious apps can also be installed without the owners permission or knowledge Vulnerability in mobile devices refers to aspects of system security that are susceptible to attacks A vulnerability occurs when there is system weakness an attacker has access to the weakness and the attacker has competency to exploit the weakness 1 Potential attackers began looking for vulnerabilities when Apple s iPhone and the first Android devices came onto the market Since the introduction of apps particularly mobile banking apps which are vital targets for hackers malware has been rampant The Department of Homeland Security s cybersecurity department claims that the number of vulnerable points in smartphone operating systems has increased when As mobile phones are connected to utilities and appliances hackers cybercriminals and even intelligence officials have access to these devices 4 Starting in 2011 it became increasingly popular to let employees use their own devices for work related purposes The Crowd Research Partners study published in 2017 reports that during 2017 most businesses that mandated the use of mobile devices were subjected to malware attacks and breaches It has become common for rogue applications to be installed on user devices without the user s permission They breach privacy which hinders the effectiveness of the devices citation needed clarification needed Since the recent rise of mobile attacks hackers have increasingly targeted smartphones through credential theft and snooping The number of attacks targeting smartphones and other devices has risen by 50 percent citation needed According to the study which mobile banking applications are responsible for the increase in attacks Malware such as ransomware worms botnets Trojans and viruses have been developed to exploit vulnerabilities in mobile devices Malware is distributed by attackers so they can gain access to private information or digitally harm a user For example should malware breach a user s banking service it may be able to access their transaction information their rights to log in and their money Some malware is developed with anti detection techniques to avoid detection Attackers who use malware can avoid detection by hiding malicious code Trojan droppers can also avoid detection of malware Despite the fact that the malware inside a device does not change the dropper generates new hashes each time Additionally droppers can also create a multitude of files which can lead to the creation of viruses Android mobile devices are prone to Trojan droppers The banking Trojans also enable attacks on the banking applications on the phone which leads to the theft of data for use in stealing money and funds clarification needed Jailbreaks for iOS devices work by disabling the signing of codes on iPhones so that applications not downloaded from the App Store can be operated In this way all the protection layers offered by iOS are disrupted exposing the device to malware These outside applications don t run in a sandbox which exposes potential security problems Some attack vectors change the mobile devices configuration settings by installing malicious credentials and virtual private networks VPNs to direct information to malicious systems In addition spyware can be installed on mobile devices in order to track an individual Triade malware comes pre installed on some mobile devices In addition to Haddad there is Lotoor which exploits vulnerabilities in the system to repackage legitimate applications 5 The devices are also vulnerable due to spyware and leaky behaviors through applications Mobile devices are also effective conveyance systems for malware threats breaches of information and thefts Wi Fi interference technologies can also attack mobile devices through potentially insecure networks By compromising the network hackers are able to gain access to key data Devices connected to public networks are at risk of attacks A VPN on the other hand can be used to secure networks As soon as a system is threatened an active VPN will operate There are also social engineering techniques such as phishing in which unsuspecting victims are sent links to lead them to malicious websites The attackers can then hack into the victim s device and copy all of its information Some mobile device attacks can be prevented For example containerization allows the creation of a hardware infrastructure that separates business data from other data Additionally network protection detects malicious traffic and rogue access points Data security is also ensured through authentication 1 There are a number of threats to mobile devices including annoyance stealing money invading privacy propagation and malicious tools 6 There are three prime targets for attackers 7 Data Smartphones are devices for data management and may contain sensitive data like credit card numbers authentication information private information activity logs calendar call logs Identity Smartphones are highly customizable so the device or its contents can easily be associated with a specific person Availability Attacking a smartphone can limit or deprive a user s access to it Attacks on mobile security systems include Botnets Attackers infect multiple machines with malware that victims generally acquire via e mail attachments or from compromised applications or websites The malware then gives hackers remote control of zombie devices which can then be instructed to perform harmful acts 6 Malicious applications Hackers upload malicious programs or games to third party smartphone application marketplaces The programs steal personal information and open backdoor communication channels to install additional applications and cause other problems 6 Malicious links on social networks An effective way to spread malware where hackers can place Trojans spyware and backdoors 6 Spyware Hackers use this to hijack phones allowing them to hear calls see text messages and e mails and track a user s location through GPS updates 6 The source of these attacks are the same actors found in the non mobile computing space 7 Professionals whether commercial or military who focus on the three targets mentioned above They steal sensitive data from the general public as well as undertake industrial espionage They will also use the identity of those attacked to achieve other attacks Thieves who want to gain income through data or identities they have stolen The thieves will attack many people to increase their potential income Black hat hackers who specifically attack availability 8 failed verification Their goal is to develop viruses and cause damage to the device 9 failed verification In some cases hackers have an interest in stealing data on devices Grey hat hackers who reveal vulnerabilities 10 Their goal is to expose vulnerabilities of the device 11 Grey hat hackers do not intend on damaging the device or stealing data 12 Consequences edit When a smartphone is infected by an attacker the attacker can attempt several things The attacker can manipulate the smartphone as a zombie machine a machine with which the attacker can communicate and send commands which will be used to send unsolicited messages spam via SMS or email 13 The attacker can easily force the smartphone to make phone calls For example one can use the API library that contains the basic functions not present in the smartphone PhoneMakeCall by Microsoft which collects telephone numbers from any source such as yellow pages and then calls them 13 The attacker can use this method to call paid services resulting in charges to the smartphone owner Dangerously the smartphone could call and disrupt emergency services 13 A compromised smartphone can record conversations between the user and others and send them to a third party 13 This can cause user privacy and industrial security problems An attacker can also steal a user s identity usurp their identity with a copy of the user s SIM card or even the telephone itself and thus impersonate the owner This raises security concerns in countries where smartphones can be used to place orders view bank accounts or are used as an identity card 13 The attacker can reduce the usability of the smartphone by discharging the battery 14 For example they can launch an application that will run continuously on the smartphone processor requiring a lot of energy and draining the battery Frank Stajano and Ross Anderson first described this form of attack calling it an attack of battery exhaustion or sleep deprivation torture 15 The attacker can make the smartphone unusable 16 This attack can delete the boot scripts resulting in a phone without a functioning operating system modify certain files to make it unusable such as a script that launches at startup that forces the smartphone to restart or embed a startup application that will empty the battery 15 The attacker can remove the user s data whether personal photos music videos or professional contacts calendars notes 16 Attacks based on communication editAttacks based on SMS and MMS edit Some attacks derive from flaws in the management of Short Message Service SMS and Multimedia Messaging Service MMS Some mobile phone models have problems in managing binary SMS messages By sending an ill formed block it is possible to cause the phone to restart leading to the denial of service attacks If a user with a Siemens S55 received a text message containing a Chinese character it would lead to a denial of service 17 In another case while the standard requires that the maximum size of a Nokia Mail address is 32 characters some Nokia phones did not verify this standard so if a user enters an email address over 32 characters that leads to complete dysfunction of the e mail handler and puts it out of commission This attack is called curse of silence A study on the safety of the SMS infrastructure revealed that SMS messages sent from the Internet can be used to perform a distributed denial of service DDoS attack against the mobile telecommunications infrastructure of a big city The attack exploits the delays in the delivery of messages to overload the network Another potential attack could begin with a phone that sends an MMS to other phones with an attachment This attachment is infected with a virus Upon receipt of the MMS the user can choose to open the attachment If it is opened the phone is infected and the virus sends an MMS with an infected attachment to all the contacts in the address book There is a real world example of this attack the virus Commwarrior 16 sends MMS messages including an infected file to all recipients in a mobile phone s address book If a recipient installs the infected file the virus repeats sending messages to recipients taken from the new address book Attacks based on communication networks edit GSM networks edit The attacker may try to break the encryption of a GSM mobile network The network encryption algorithms belong to the family of algorithms called A5 Due to the policy of security through obscurity it has not been possible to openly test the robustness of these algorithms There were originally two variants of the algorithm A5 1 and A5 2 stream ciphers where the former was designed to be relatively strong and the latter was purposely designed to be weak to allow easy cryptanalysis and eavesdropping ETSI forced some countries typically outside Europe to use A5 2 Since the encryption algorithm was made public it was proved to be breakable A5 2 could be broken on the fly and A5 1 in about 6 hours 18 In July 2007 the 3GPP approved a change request to prohibit the implementation of A5 2 in any new mobile phones decommissioning the algorithm it is no longer implemented in mobile phones Stronger public algorithms have been added to the GSM standard the A5 3 and A5 4 Block ciphers otherwise known as KASUMI or UEA1 19 published by ETSI If the network does not support A5 1 or any other A5 algorithm implemented by the phone then the base station can specify A5 0 which is the null algorithm whereby the radio traffic is sent unencrypted Even if mobile phones are able to use 3G or 4G which have much stronger encryption than 2G GSM the base station can downgrade the radio communication to 2G GSM and specify A5 0 no encryption 20 This is the basis for eavesdropping attacks on mobile radio networks using a fake base station commonly called an IMSI catcher In addition tracing of mobile terminals is difficult since each time the mobile terminal is accessing or being accessed by the network a new temporary identity TMSI is allocated to the mobile terminal The TMSI is used as the identity of the mobile terminal the next time it accesses the network The TMSI is sent to the mobile terminal in encrypted messages citation needed Once the encryption algorithm of GSM is broken the attacker can intercept all unencrypted communications made by the victim s smartphone Wi Fi edit See also Wi Fi Network security nbsp Access Point spoofing An attacker can try to eavesdrop on Wi Fi communications to derive information e g username password This type of attack is not unique to smartphones but they are very vulnerable to these attacks because often Wi Fi is their only means of communication and access the internet The security of wireless networks WLAN is thus an important subject Initially wireless networks were secured by WEP keys The weakness of WEP is its short encryption key which is the same for all connected clients In addition several reductions in the search space of the keys have been found by researchers Now most wireless networks are protected by the WPA security protocol WPA is based on the Temporal Key Integrity Protocol TKIP which was designed to allow migration from WEP to WPA on the equipment already deployed The major improvements in security are the dynamic encryption keys For small networks the WPA uses a pre shared key which is based on a shared key Encryption can be vulnerable if the length of the shared key is short With limited opportunities for input i e only the numeric keypad mobile phone users might define short encryption keys that contain only numbers This increases the likelihood that an attacker succeeds with a brute force attack The successor to WPA called WPA2 is supposed to be safe enough to withstand a brute force attack The ability to access free and fast Wi Fi gives a business an edge over those who do not Free Wi Fi is usually provided by organizations such as airports coffee shops and restaurants for a number of reasons including encouraging customers to spend more time and money on the premises and helping users stay productive 1 Another reason is enhancing customer tracking many restaurants and coffee shops compile data about their customers so they can target advertisements directly to their devices citation needed This means that customers know what services the facility provides Generally individuals filter business premises based on Internet connections as another reason to gain a competitive edge Network security is the responsibility of the organizations as unsecured Wi Fi networks are prone to numerous risks The man in the middle attack entails the interception and modification of data between parties Additionally malware can be distributed via the free Wi Fi network and hackers can exploit software vulnerabilities to smuggle malware onto connected devices It is also possible to eavesdrop and sniff Wi Fi signals using special software and devices capturing login credentials and hijacking accounts 9 As with GSM if the attacker succeeds in breaking the identification key both the phone and the entire network it is connected to become exposed to attacks Many smartphones remember wireless LANs they have previously connected to allowing users to not have to re identify with each connection However an attacker could create a Wi Fi access point twin with the same parameters and characteristics as a real network By automatically connecting to the fraudulent network a smartphone becomes susceptible to the attacker who can intercept any unencrypted data 21 Lasco is a worm that initially infects a remote device using the SIS file format 22 a type of script file that can be executed by the system without user interaction The smartphone thus believes the file to come from a trusted source and downloads it infecting the machine 22 Bluetooth edit Main article Bluetooth Security See also Bluesnarfing and Bluebugging Security issues related to Bluetooth on mobile devices have been studied and have shown numerous problems on different phones One easy to exploit vulnerability is that unregistered services do not require authentication and vulnerable applications have a virtual serial port used to control the phone An attacker only needed to connect to the port to take full control of the device 23 In another example an attacker sends a file via Bluetooth to a phone within range with Bluetooth in discovery mode If the recipient accepts a virus is transmitted An example of this is a worm called Cabir 16 The worm searches for nearby phones with Bluetooth in discoverable mode and sends itself to the target device The user must accept the incoming file and install the program after which the worm infects the machine Attacks based on vulnerabilities in software applications editOther attacks are based on flaws in the OS or applications on the phone Web browser edit See also Browser security The mobile web browser is an emerging attack vector for mobile devices Just as common Web browsers mobile web browsers are extended from pure web navigation with widgets and plug ins or are completely native mobile browsers Jailbreaking the iPhone with firmware 1 1 1 was based entirely on vulnerabilities on the web browser 24 In this case there was a vulnerability based on a stack based buffer overflow in a library used by the web browser LibTIFF A similar vulnerability in the web browser for Android was discovered in October 2008 25 Like the iPhone vulnerability it was due to an obsolete and vulnerable library but significantly differed in that Android s sandboxing architecture limited the effects of this vulnerability to the Web browser process Smartphones are also victims of classic Web piracy such as phishing malicious websites and background running software The big difference is that smartphones do not yet have strong antivirus software available 26 failed verification The Internet offers numerous interactive features that ensure a higher engagement rate capture more and relevant data and increase brand loyalty Blogs forums social networks and wikis are some of the most common interactive websites Due to the tremendous growth of the Internet there has been a rapid rise in the number of security breaches experienced by individuals and businesses Mobile browser users can balance usage and caution in several ways 27 such as reviewing computer security regularly using secure and secret passwords and correcting upgrading and replacing the necessary features Installation of antivirus and anti spyware programs is the most effective way of protecting the computer as they offer protection against malware spyware and viruses Additionally they use firewalls which are typically installed between trusted networks or devices and the Internet By acting as a web server the firewall prevents external users from accessing the internal computer system 28 failed verification Operating system edit See also Operating system Security Sometimes it is possible to overcome the security safeguards by modifying the operating system OS itself such as the manipulation of firmware and malicious signature certificates These attacks are difficult In 2004 vulnerabilities in virtual machines running on certain devices were revealed It was possible to bypass the bytecode verifier and access the native underlying operating system 3 The results of this research were not published in detail The firmware security of Nokia s Symbian Platform Security Architecture PSA is based on a central configuration file called SWIPolicy In 2008 it was possible to manipulate the Nokia firmware before it was installed In fact some downloadable versions of this file were human readable so it was possible to modify and change the image of the firmware 29 This vulnerability was solved by an update from Nokia In theory smartphones have an advantage over hard drives since the OS files are in read only memory ROM and cannot be changed by malware However in some systems it was possible to circumvent this in the Symbian OS it was possible to overwrite a file with a file of the same name 29 On the Windows OS it was possible to change a pointer from a general configuration file to an editable file When an application is installed the signing of this application is verified by a series of certificates One can create a valid signature without using a valid certificate and add it to the list 30 In the Symbian OS all certificates are in the directory c resource swicertstore dat With firmware changes explained above it is very easy to insert a seemingly valid but malicious certificate Android is the OS that has been attacked the most because it has the largest userbase A cybersecurity company which reported to have blocked about 18 million attacks in 2016 31 Attacks based on hardware vulnerabilities editElectromagnetic waveforms edit In 2015 researchers at the French government agency Agence nationale de la securite des systemes d information ANSSI lit French National Agency for the Security of Information Systems demonstrated the capability to trigger the voice interface of certain smartphones remotely by using specific electromagnetic waveforms 4 The exploit took advantage of antenna properties of headphone wires while plugged into the audio output jacks of the vulnerable smartphones and effectively spoofed audio input to inject commands via the audio interface 4 Juice jacking edit See also Juice jacking Juice jacking is a physical or hardware vulnerability specific to mobile platforms Utilizing the dual purpose of the USB charge port many devices have been susceptible to having data exfiltrated from or malware installed onto a mobile device by utilizing malicious charging kiosks set up in public places or hidden in normal charge adapters Jailbreaking and rooting edit Jailbreaking is also a physical access vulnerability in which a mobile device user hacks into device to unlock it exploiting weaknesses in the operating system Mobile device users take control of their own device by jailbreaking it allowing them to customize the interface by installing applications change system settings that are not allowed on the devices tweak OS processes and run uncertified programs This openness exposes the device to a variety of malicious attacks which can compromise private data 5 Password cracking editIn 2010 researchers from the University of Pennsylvania investigated the possibility of cracking a device s password through a smudge attack literally imaging the finger smudges on the screen to discern the user s password 27 The researchers were able to discern the device password up to 68 of the time under certain conditions 27 Outsiders may perform over the shoulder surveillance on victims such as watching specific keystrokes or pattern gestures to unlock device password or passcode Malicious software malware editMain article Mobile malware nbsp Malware types based on number of infected smartphones 2009 32 As smartphones are a permanent point of access to the Internet they are often turned on they can be compromised with malware as easily as computers A malware is a computer program that aims to harm the system in which it resides Trojans worms and viruses are all considered malware A Trojan is a program on a device that allows external users to connect discreetly A worm is a program that reproduces on multiple computers across a network A virus is a malicious software designed to spread to other computers by inserting itself into legitimate programs and running programs in parallel Malware is far less numerous and serious to smartphones as it is to computers Nonetheless recent studies show that the evolution of malware in smartphones have rocketed in the last few years posing a threat to analysis and detection 25 In 2017 mobile malware variants increased by 54 33 Problematic common apps and pre installed software edit Various common apps installed by millions can intrude on privacy even if they were installed from a trusted software distribution service like the Google Play Store For example in 2022 it was shown that the popular app TikTok collects a lot of data and is required to make it available to the Chinese Communist Party CCP due to a national security law This includes personal information on millions of Americans The firmware and stock software preinstalled on devices and updated with preinstalled software can also have undesired components or privacy intruding default configurations or substantial security vulnerabilities In 2019 Kryptowire identified Android devices with malicious firmware that collected and transmitted sensitive data without users consent Analysis of data traffic by popular smartphones running variants of Android found substantial by default data collection and sharing with no opt out by pre installed software 34 35 This issue also can t be addressed by conventional security patches Outgoing Internet traffic can be analyzed with packet analyzers and with firewall apps like the NetGuard firewall app for Android that allows reading blocked traffic logs 36 additional citation s needed Malware attacks edit Typically an attack on a smartphone made by malware takes place in three phases the infection of a host the accomplishment of its goal and the spread of the malware to other systems Malware often uses the resources offered by infected smartphones It will use the output devices such as Bluetooth or infrared but it may also use the address book or email address of the person to infect the user s acquaintances The malware exploits the trust that is given to data sent by an acquaintance Infection edit Infection is the method used by malware to gain access to the smartphone it may exploit an internal vulnerability or rely on the gullibility of the user Infections are classified into four classes according to their degree of user interaction 37 Explicit permission The most benign interaction is to ask the user if it is allowed to infect the machine clearly indicating its potential malicious behavior This is typical behavior of a proof of concept malware Implied permission This infection is based on the fact that the user has a habit of installing software Most Trojans try to seduce the user into installing attractive applications like games or useful applications that actually contain malware Common interaction This infection is related to a common behavior such as opening an MMS or email No interaction The device is infected without the user taking action This class of infection is the most dangerous as it is both unapproved and automatic Accomplishment of its goalOnce the malware has infected a phone it will also seek to accomplish its goal which is usually one of the following 38 Monetary damages The attacker can steal user data and either sell them to the same user or sell to a third party Data or device damage Malware can partially damage the device or delete or modify data on the device Concealed damage The two aforementioned types of damage are detectable but the malware can also leave a backdoor for future attacks or even conduct wiretaps Spread to other systems edit Once the malware has infected a smartphone it aims to spread to a new host 39 This usually occurs to proximate devices via Wi Fi Bluetooth or infrared or to remote networks via telephone calls SMS or emails nbsp Diagram in French which ranks common smartphone malware behaviors by frequency 32 At least 50 malware varieties exhibit no negative behavior except their ability to spread 32 Examples edit Viruses and Trojans edit Main article Mobile virus Cabir also known as Caribe SybmOS Cabir Symbian Cabir and EPOC cabir is the name of a computer worm developed in 2004 designed to infect mobile phones running Symbian OS It is believed to have been the first computer worm able to infect mobile phones Commwarrior created on March 7 2005 was the first worm able to infect many machines from MMS 16 It is sent as COMMWARRIOR ZIP containing the file COMMWARRIOR SIS When this file is executed Commwarrior attempts to connect to nearby devices by Bluetooth or infrared under a random name It then attempts to send MMS message to the contacts in the smartphone with different header messages for each person who receive the MMS and often open them without further verification Phage was the first Palm OS virus discovered 16 It transfers to the Palm from a PC via synchronization It infects all applications in the smartphone and embeds its own code to function without the user and the system detecting it From the system s perspective all the applications behave as expected RedBrowser is a Trojan based on Java 16 The Trojan masquerades as a program called RedBrowser which allows the user to visit WAP sites without a WAP connection During application installation the user sees a request on their phone that the application needs permission to send messages If the user accepts RedBrowser can send SMS to paid call centers This program uses the smartphone s connection to social networks e g Facebook Twitter to get the contact information for the user s acquaintances provided the required permissions have been given and will send them messages WinCE PmCryptic A is a malicious software on Windows Mobile which aims to earn money for its authors It uses the infestation of memory cards that are inserted in the smartphone to spread more effectively 40 CardTrap is a virus that is available on different types of smartphones which aims to deactivate the system and third party applications It works by replacing the files used to start the smartphone and applications to prevent them from executing 41 There are different variants of this virus such as Cardtrap A for SymbOS devices It also infects the memory card with malware capable of infecting Windows Ghost Push is malicious software on Android OS which automatically roots the Android device and installs malicious applications directly to system partition It then unroots the device to prevent users from removing the threat by master reset the threat can be removed only by reflashing It cripples the system resources executes quickly and is hard to detect Ransomware edit Mobile ransomware is a type of malware that locks users out of their mobile devices in a pay to unlock your device ploy It has significantly grown as a threat category since 2014 42 Mobile users are often less security conscious particularly as it pertains to scrutinizing applications and web links and trust the mobile device s native protection capability Mobile ransomware poses a significant threat to businesses reliant on instant access and availability of their proprietary information and contacts The likelihood of a traveling businessman paying a ransom to unlock their device is significantly higher since they are at a disadvantage given inconveniences such as timeliness and less direct access to IT staff Recent ransomware attacks have caused many Internet connected devices to not work and are costly for companies to recover from Spyware edit Main article Spyware Pegasus In 2021 journalists and researchers reported the discovery of spyware developed and distributed by a private company which can and has been used to infect both iOS and Android smartphones often partly via use of 0 day exploits without the need for any user interaction or significant clues to the user The spyware is then used to exfiltrate data track user locations capture film through its camera and activate the microphone at any time 43 Flexispy is a Symbian application that can be considered a Trojan The program sends all information received and sent from the smartphone to a Flexispy server It was originally created to protect children and spy on adulterous spouses 16 28 Portability of malware across platforms edit Attackers can make their malware target multiple platforms Some malware attacks operating systems but is able to spread across different systems To begin with malware can use runtime environments like Java virtual machine or the NET Framework They can also use other libraries present in many operating systems 44 Some malware carries several executable files in order to run in multiple environments utilizing these during the propagation process In practice this type of malware requires a connection between the two operating systems to use as an attack vector Memory cards can be used for this purpose or synchronization software can be used to propagate the virus Countermeasures editMobile security is divided into different categories as methods do not all act at the same level and are designed to prevent different threats These methods range from the management of security by the operating system protecting the system from corruption by an application to the behavioral education of the user preventing the installation of a suspicious software Security in operating systems edit The first layer of security in a smartphone is the operating system Beyond needing to handle the usual roles e g resource management scheduling processes on the device it must also establish the protocols for introducing external applications and data without introducing risk citation needed A central paradigm in mobile operating systems is the idea of a sandbox Since smartphones are currently designed to accommodate many applications they must have mechanisms to ensure these applications are safe for the phone itself for other applications and data on the system and for the user If a malicious program reaches a mobile device the vulnerable area presented by the system must be as small as possible Sandboxing extends this idea to compartmentalize different processes preventing them from interacting and damaging each other Based on the history of operating systems sandboxing has different implementations For example where iOS will focus on limiting access to its public API for applications from the App Store by default Managed Open In allows you to restrict which apps can access which types of data Android bases its sandboxing on its legacy of Linux and TrustedBSD The following points highlight mechanisms implemented in operating systems especially Android Rootkit detectors The intrusion of a rootkit in the system is a great danger in the same way as on a computer It is important to prevent such intrusions and to be able to detect them as often as possible Indeed there is concern that with this type of malicious program an attacker could partially or completely bypass the device security or acquire administrator rights If this happens nothing prevents the attacker from studying or disabling the safety features that were circumvented deploying the applications they want or disseminating a method of intrusion by a rootkit to a wider audience 45 46 An example of a defense mechanism against this is the chain of trust such as in iOS This mechanism relies on signatures from applications required to start the operating system and a certificate signed by the manufacturer Apple In the event that the signature checks are inconclusive the device detects this and stops the boot up 47 If the operating system is compromised due to jailbreaking rootkit detection may not work if it is disabled by the jailbreak method or software is loaded after jailbreak disables Rootkit Detection Process isolation Android uses mechanisms of user process isolation inherited from Linux Each application has a user associated with it and a tuple UID GID This approach serves as a sandbox while applications can be malicious they cannot get out of the sandbox reserved for them by their identifiers and thus cannot interfere with the proper functioning of the system For example since it is impossible for a process to end the process of another user an application can thus not stop the execution of another application 45 48 49 50 51 File permissions From the legacy of Linux filesystem permissions mechanisms also help with sandboxing Permissions prevent a process from editing any files it wants It is therefore not possible to freely corrupt files necessary for the operation of another application or system Furthermore in Android there is the method of locking memory permissions It is not possible to change the permissions of files installed on the SD card from the phone and consequently it is impossible to install applications 52 53 54 Memory protection In the same way as on a computer memory protection prevents privilege escalation This could occur if a process managed to reach an area allocated to other processes where it could write in the memory of a process with rights superior to its own with root in the worst case and perform actions beyond its permissions It would suffice to insert function calls are authorized by the privileges of the malicious application 51 Development through runtime environments Software is often developed in high level languages which can control what is being done by a running program For example Java virtual machines continuously monitor the actions of the execution threads they manage monitor and assign resources and prevent malicious actions Buffer overflows can be prevented by these controls 55 56 51 Security software edit Above the operating system security there is a layer of security software This layer is composed of individual components to strengthen various vulnerabilities prevent malware intrusions the identification of a user as a human and user authentication It contains software components that have learned from their experience with computer security however on smartphones this software must deal with greater constraints see limitations Antivirus and firewall An antivirus software can be deployed on a device to verify that it is not infected by a known threat usually by signature detection software that detects malicious executable files A mobile antivirus product would scan files and compare them against a database of known mobile malware code signatures 6 A firewall meanwhile can watch over the existing traffic on the network and ensure that a malicious application does not seek to communicate through it It may equally verify that an installed application does not seek to establish suspicious communication which may prevent an intrusion attempt 57 58 59 46 Visual notifications In order to make the user aware of any abnormal actions such as a call they did not initiate one can link some functions to a visual notification that is impossible to circumvent For example when a call is triggered the called number should always be displayed Thus if a call is triggered by a malicious application the user can see and take appropriate action Turing test It is important to confirm certain actions by a user decision The Turing test is used to distinguish between a human and a virtual user often in the form of a CAPTCHA Biometric identification Another method to use is biometrics 60 a technique of identifying a person by means of their morphology e g by recognition of the face or eye or their behavior e g their signature or way of writing One advantage of using biometric security is that users can avoid having to remember a password or other secret combination to authenticate and prevent malicious users from accessing their devices In a system with strong biometric security only the primary user can access the smartphone Resource monitoring in the smartphone edit Should a malicious application pass the security barriers it can take the actions for which it was designed However this activity can be sometimes detected by monitoring the various resources used on the phone Depending on the goals of the malware the consequences of infection are not always the same all malicious applications are not intended to harm the devices on which they are deployed 61 The following resources are only indications and do not provide certainty about the legitimacy of the activity of an application However these criteria can help target suspicious applications especially if several criteria are combined Battery Some malware is aimed at exhausting the energy resources of the phone Monitoring the energy consumption of the phone can be a way to detect certain malware applications 45 Memory usage Memory usage is inherent in any application However if one finds that an unnecessary or unexpected proportion of memory is used by an application it may be flagged as suspicious Network traffic As part of normal operation on a smartphone many applications are bound to connect via the network However an application using a lot of bandwidth can be strongly suspected of attempting to communicate a lot of information and disseminate data to many other devices This observation only allows a suspicion because some legitimate applications can be very resource intensive in terms of network communications the best example being streaming video Services One can monitor the activity of various services of a smartphone During certain moments some services should not be active and if one is detected the application should be suspected For example the sending of an SMS when the user is filming video this communication does not make sense and is suspicious malware may attempt to send SMS while its activity is masked 62 Network surveillance edit Network traffic exchanged by phones can be monitored One can place safeguards in network routing points in order to detect abnormal behavior As the mobile s use of network protocols is much more constrained than that of a computer expected network data streams can be predicted e g the protocol for sending an SMS which permits detection of anomalies in mobile networks 63 Spam filters Similar to email exchanges spam can be detected through means of mobile communications SMS MMS It is therefore possible to detect and minimize this kind of attempt by filters deployed on network infrastructure that is relaying these messages Encryption of stored or transmitted information Because it is always possible that data exchanged can be intercepted communications and information storage rely on encryption to prevent a malicious entity from using any data obtained during communications However this poses the problem of key exchange for encryption algorithms which requires a secure channel Telecom network monitoring The networks for SMS and MMS exhibit predictable behavior and there is not as much liberty compared with what one can do with protocols such as TCP or UDP This implies that one cannot predict the flow of data from common web protocols a protocol might generate very little traffic by consulting simple pages rarely or generate heavy traffic by using video streaming On the other hand messages exchanged via mobile phone have a framework and a specific model and the user does not in a normal case have the freedom to intervene in the details of these communications Therefore if an abnormality is found in the flux of network data in the mobile networks the potential threat can be quickly detected Manufacturer surveillance edit In the production and distribution chain for mobile devices manufacturers are responsibility for ensuring that devices are delivered in a basic configuration without vulnerabilities Most users are not experts and many of them are not aware of the existence of security vulnerabilities so the device configuration as provided by manufacturers will be retained by many users Some smartphone manufacturers add Titan M2s a security hardware chip to increase mobile security 64 65 Remove debug mode Phones are sometimes set in a debug mode during manufacturing but this mode must be disabled before the phone is sold This mode allows access to features not intended for routine use by a user Due to the speed of development and production distractions occur and some devices are sold in debug mode This kind of deployment exposes mobile devices to exploits that utilize this oversight 66 67 Default settings When a smartphone is sold its default settings must be correct and not leave security gaps The default configuration is not always changed so a good initial setup is essential for users There are for example default configurations that are vulnerable to denial of service attacks 45 68 Security audit of apps App stores have emerged alongside smartphones Both users and providers are tasked with examining the immense volume of apps available from different points of view e g security content Security audits should be particularly cautious because if a fault is not detected the application can spread very quickly within a few days and infect a significant number of devices 45 Detect suspicious applications demanding rights When installing applications it is good to warn the user against sets of permissions that grouped together seem potentially dangerous or at least suspicious Frameworks like such as Kirin on Android attempt to detect and prohibit certain sets of permissions 69 Revocation procedures First developed for Android a process known as remote revocation can remotely and globally uninstall an application from any device that has it This means the spread of a malicious application that evaded security checks can be immediately stopped when the threat is discovered 70 71 Avoid heavily customized systems Manufacturers are tempted to overlay custom layers on existing operating systems with the dual purpose of offering customized options and disabling or charging for certain features This has the dual effect of risking the introduction of new bugs in the system coupled with an incentive for users to modify the systems to circumvent the manufacturer s restrictions These systems are rarely as stable and reliable as the original and may suffer from phishing attempts or other exploits citation needed Improve software patch processes New versions of various software components of a smartphone including operating systems are regularly published These patches correct flaws over time Nevertheless manufacturers often do not deploy these updates to their devices in a timely fashion and sometimes not at all Thus vulnerabilities can persist when they could be corrected while they exist and are generally known they are easily exploitable 69 User awareness edit The user has a large responsibility in the cycle of security This can be as simple as using a password or as detailed as precisely controlling which permissions are granted to applications This precaution is especially important if the user is an employee of a company who stores business data on the device Much malicious behavior is allowed by user carelessness Smartphone users were found to ignore security messages during application installation especially during application selection and checking application reputation reviews security and agreement messages 72 A recent survey by internet security experts BullGuard showed a lack of insight concerning the rising number of malicious threats affecting mobile phones with 53 of users claiming that they are unaware of security software for smartphones A further 21 argued that such protection was unnecessary and 42 admitted it hadn t crossed their mind Using APA 2011 full citation needed These statistics show that consumers are not concerned about security risks because they believe it is not a serious problem However in truth smartphones are effectively handheld computers and are just as vulnerable The following are precautions that a user can take to manage security on a smartphone Be skeptical A user should not believe everything that may be presented as some information may be wrong misleading phishing or attempting to distribute a malicious application It is therefore advisable to check an application s reputation before buying or installing it 73 Permissions given to applications The mass distribution of applications necessitates different permissions mechanisms for each operating system It is necessary to clarify these permissions mechanisms to users as they differ between systems and can be confusing In addition it is rarely feasible or possible to modify large sets of permissions requested by an application However this can be a source of risk because a user can grant an application excessive rights beyond what is necessary For example a note taking application does not require access to the geolocation service to function During installation the user must consider an application s privileges and should not accept the installation if the requested rights are inconsistent 74 68 75 Be careful A user s phone can be protected through simple gestures and precautions such as locking the smartphone when it is not in use not leaving the device unattended not blindly trusting applications not storing sensitive data or encrypting sensitive data that cannot be separated from the device 76 77 Disconnect unused peripheral devices According to NIST Guidelines for Managing the Security of Mobile Devices 2013 it is recommended to Restrict user and application access to hardware such as the digital camera GPS Bluetooth interface USB interface and removable storage This can include removing permissions and configurations for unused peripheral devices Enable Android Device Encryption edit The latest Android as of smartphones come with a built in encryption setting for securing all the information saved on your device This makes it difficult for a hacker to extract and decipher the information in case your device is compromised It can be accessed via Settings Security Encrypt Phone Encrypt SD Card Ensure data Smartphones have significant memory capacity and can carry several gigabytes of data The user must be careful about what data it carries and whether they should be protected such as files containing bank information or business data The user must have the prudence to avoid the transmission of sensitive data on a smartphone which can be easily stolen Furthermore when a user gets rid of a device they must be sure to remove all personal data first 78 These precautions reduce the ability for people or malicious applications to exploit a user s smartphone If users are careful many attacks can be defeated especially phishing and applications seeking only to obtain rights on a device Centralized storage edit One form of mobile protection allows companies to control the delivery and storage of text messages by hosting the messages on a company server rather than on the sender or receiver s phone When certain conditions are met such as an expiration date the messages are deleted 79 Limitations edit The security mechanisms mentioned in this article are to a large extent inherited from knowledge and experience with computer security The elements composing the two device types are similar and there are common measures that can be used such as antivirus software and firewalls However the implementation of these solutions is not necessarily possible or is at least highly constrained within a mobile device The reason for this difference is the technical resources available to computers and mobile devices even though the computing power of smartphones is becoming faster they have other limitations Single task system Some operating systems including some still commonly used are single tasking Only the foreground task is executed It is difficult to introduce applications such as antivirus and firewall on such systems because they cannot perform their monitoring while the user is operating the device when monitoring is most needed Energy autonomy A critical limitation for smartphones is energy autonomy It is important that security mechanisms not consume too much battery resources which could dramatically undermine the smartphone s autonomy and usage Network Directly related to battery life network utilization should not be too high From the point of view of energy consumption network utilization is one of the most expensive resources Nonetheless some calculations may need to be relocated to remote servers in order to preserve the battery This balance can make implementation of certain intensive computation mechanisms a delicate situation 80 Furthermore it is common that even if updates exist or can be developed they are not always deployed For example a user may not be aware of operating system updates or a user may discover known vulnerabilities that are not corrected until the end of a long development cycle which allows time to exploit the loopholes 67 Next generation of mobile security edit The following mobile environments are expected to make up future security frameworks Rich operating system This category will contain traditional mobile operating systems like Android iOS Symbian OS or Windows Phone They will provide the traditional functionality and security of an OS to the applications Secure Operating System Secure OS This category features a secure kernel which will run in parallel with a fully featured Rich OS on the same processor core It will include drivers for the Rich OS normal world to communicate with the secure kernel secure world The trusted infrastructure could include interfaces like the display or keypad to regions of PCI E address space and memories Trusted Execution Environment TEE This environment will be made up of hardware and software It helps control of access rights and houses sensitive applications which need to be isolated from the Rich OS It effectively acts as a firewall between the normal world and secure world Secure Element SE The SE consists of tamper resistant hardware and associated software or separate isolated hardware It can provide high levels of security and work in tandem with the TEE The SE will be mandatory for hosting proximity payment applications or official electronic signatures SE may connect disconnect block peripheral devices and operate separate set of hardware Security Applications SA Numerous security applications are available on app stores providing protection from viruses and performing vulnerability assessment 81 See also editBrowser security Computer security Information security Mobile Malware Mobile secure gateway Phone hacking Telephone tapping Wireless Public Key Infrastructure WPKI Wireless security Defense strategy computing Exploits of mobile securityNotes edit a b c d e What is mobile security wireless security Definition from WhatIs com WhatIs com Retrieved 2020 12 05 Furnell 2009 p 13 CHAPTER 1 GETTING MOBILE a b c BYOD and Increased Malware Threats Help Driving Billion Dollar Mobile Security Services Market in 2013 ABI Research 2013 03 29 Retrieved 2018 11 11 a b c Kasmi C Lopes Esteves J 13 August 2015 IEMI Threats for Information Security Remote Command Injection on Modern Smartphones IEEE Transactions on Electromagnetic Compatibility 57 6 1752 1755 doi 10 1109 TEMC 2015 2463089 S2CID 34494009 Andy Greenberg 14 October 2015 Hackers Can Silently Control Siri From 16 Feet Away Wired a b Michael SW Lee Ian Soon 2017 06 13 Taking a bite out of Apple Jailbreaking and the confluence of brand loyalty consumer resistance and the co creation of value Journal of Product amp Brand Management 26 4 351 364 doi 10 1108 JPBM 11 2015 1045 ISSN 1061 0421 a b c d e f Leavitt Neal 2011 Mobile Security Finally a Serious Problem Computer 44 6 11 14 doi 10 1109 MC 2011 184 S2CID 19895938 a b Bishop 2004 Olson Parmy 26 August 2013 Your smartphone is hackers next big target CNN Retrieved August 26 2013 a b Guide on Protection Against Hacking PDF Mauritius National Computer Board Archived from the original PDF on 2012 11 17 Lemos Robert New laws make hacking a black and white choice CNET News com Retrieved September 23 2002 McCaney Kevin 7 May 2012 Unknowns hack NASA Air Force saying We re here to help Archived from the original on 2021 01 26 Retrieved May 7 2012 Bilton 2010 a b c d e Guo Wang amp Zhu 2004 p 3 Dagon Martin amp Starder 2004 p 12 a b Dixon amp Mishra 2010 p 3 a b c d e f g h Toyssy amp Helenius 2006 p 113 Siemens 2010 p 1 Gendrullis 2008 p 266 European Telecommunications Standards Institute 2011 p 1 Josang Miralabe amp Dallot 2015 Gittleson Kim 2014 03 28 Data stealing Snoopy drone unveiled at Black Hat BBC News Retrieved 2023 10 27 a b Toyssy amp Helenius 2006 p 27 Mulliner 2006 p 113 Dunham Abu Nimeh amp Becher 2008 p 225 a b Suarez Tangil Guillermo Juan E Tapiador Pedro Peris Lopez Arturo Ribagorda 2014 Evolution Detection and Analysis of Malware in Smart Devices PDF IEEE Communications Surveys amp Tutorials 16 2 961 987 doi 10 1109 SURV 2013 101613 00077 S2CID 5627271 Archived from the original PDF on 2017 10 31 Retrieved 2013 11 11 Ng Alfred Your smartphones are getting more valuable for hackers CNET Retrieved 2021 03 04 a b c Aviv Adam J Gibson Katherine Mossop Evan Blaze Matt Smith Jonathan M Smudge Attacks on Smartphone Touch Screens PDF 4th USENIX Workshop on Offensive Technologies a b Hamilton Keegan July 11 2018 El Chapo s lawyers want to suppress evidence from spyware used to catch cheating spouses Vice Media The Thailand based FlexiSPY bills itself as the world s most powerful monitoring software and the company s website lists prospective buyers as concerned parents who want to spy on their kids and companies interested in snooping on their employees But the app has also been dubbed stalkerware because it was initially marketed to jealous spouses paranoid about infidelity a b Becher 2009 p 65 Becher 2009 p 66 Diogenes Yuri 2019 Cybersecurity Attack and Defense Strategies Second Edition Erdal Ozkaya Safari Books Online 2nd ed Packt p 163 ISBN 978 1 83882 779 3 OCLC 1139764053 a b c Schmidt et al 2009a p 3 Eloqua Error Information PDF Archived from the original PDF on 2021 10 09 Study reveals scale of data sharing from Android mobile phones Trinity College Dublin Retrieved 16 November 2021 Liu Haoyu Patras Paul Leith Douglas J 6 October 2021 Android Mobile OS Snooping By Samsung Xiaomi Huawei and Realme Handsets PDF Retrieved 16 November 2021 NetGuard FAQ GitHub 4 November 2022 Retrieved 4 November 2022 Becher 2009 p 87 Becher 2009 p 88 Mickens amp Noble 2005 p 1 Raboin 2009 p 272 Toyssy amp Helenius 2006 p 114 Haas Peter D 2015 Ransomware goes mobile An analysis of the threats posed by emerging methods Thesis Utica College Archived from the original on 2016 02 24 What is Pegasus spyware and how does it hack phones The Guardian 18 July 2021 Retrieved 13 August 2021 Becher 2009 p 91 94 a b c d e Becher 2009 p 12 a b Schmidt et al 2008 p 5 6 Halbronn amp Sigwald 2010 p 5 6 Ruff 2011 p 127 Hogben amp Dekker 2010 p 50 Schmidt et al 2008 p 50 a b c Shabtai et al 2009 p 10 Becher 2009 p 31 Schmidt et al 2008 p 3 Shabtai et al 2009 p 7 8 Pandya 2008 p 15 Becher 2009 p 22 Becher et al 2011 p 96 Becher 2009 p 128 Becher 2009 p 140 Thirumathyam amp Derawi 2010 p 1 Schmidt et al 2008 p 7 12 Becher 2009 p 126 Malik 2016 p 28 Vaughan Nichols Steven J Google Tensor chip Everything we know so far ZDNet The Titan M Chip Powers Up Pixel 3 Security Wired Becher et al 2011 p 101 a b Ruff 2011 p 11 a b Hogben amp Dekker 2010 p 45 a b Becher 2009 p 13 Becher 2009 p 34 Ruff 2011 p 7 Mylonas Alexios Kastania Anastasia Gritzalis Dimitris 2013 Delegate the smartphone user Security awareness in smartphone platforms Computers amp Security 34 47 66 CiteSeerX 10 1 1 717 4352 doi 10 1016 j cose 2012 11 004 Hogben amp Dekker 2010 p 46 48 Ruff 2011 p 7 8 Shabtai et al 2009 p 8 9 Hogben amp Dekker 2010 p 43 Hogben amp Dekker 2010 p 47 Hogben amp Dekker 2010 p 43 45 Charlie Sorrel 2010 03 01 TigerText Deletes Text Messages From Receiver s Phone Wired Archived from the original on 2010 08 26 Retrieved 2010 03 02 Becher 2009 p 40 Gupta 2016 p 461 References editBooks edit Bishop Matt 2004 Introduction to Computer Security Addison Wesley Professional ISBN 978 0 321 24744 5 Dunham Ken Abu Nimeh Saeed Becher Michael 2008 Mobile Malware Attack and Defense Syngress Media ISBN 978 1 59749 298 0 Furnell Steven 2009 Mobile Security Itgp ISBN 978 1 84928 021 1 Rogers David 2013 Mobile Security A Guide for Users Copper Horse Solutions Limited ISBN 978 1 291 53309 5 Articles edit Becher Michael 2009 Security of Smartphones at the Dawn of Their Ubiquitousness PDF Dissertation Mannheim University Becher Michael Freiling Felix C Hoffmann Johannes Holz Thorsten Uellenbeck Sebastian Wolf Christopher May 2011 Mobile Security Catching Up Revealing the Nuts and Bolts of the Security of Mobile Devices PDF 2011 IEEE Symposium on Security and Privacy pp 96 111 doi 10 1109 SP 2011 29 ISBN 978 1 4577 0147 4 Bilton Nick 26 July 2010 Hackers With Enigmatic Motives Vex Companies The New York Times p 5 Cai Fangda Chen Hao Wu Yuanyi Zhang Yuan 2015 AppCracker Widespread Vulnerabilities in Userand Session Authentication in Mobile Apps PDF Dissertation University of California Davis Crussell Johnathan Gibler Clint Chen Hao 2012 Attack of the Clones Detecting Cloned Applications on Android Markets PDF Dissertation University of California Davis Dagon David Martin Tom Starder Thad October December 2004 Mobile Phones as Computing Devices The Viruses are Coming IEEE Pervasive Computing 3 4 11 doi 10 1109 MPRV 2004 21 S2CID 14224399 Dixon Bryan Mishra Shivakant June July 2010 On and Rootkit and Malware Detection in Smartphones PDF 2010 International Conference on Dependable Systems and Networks Workshops DSN W ISBN 978 1 4244 7728 9 Gendrullis Timo November 2008 A real world attack breaking A5 1 within hours Proceedings of CHES 08 Springer pp 266 282 doi 10 1007 978 3 540 85053 3 17 Gupta Sugandha 2016 Vulnebdroid Automated Vulnerability Score Calculator for Android Applications International Symposium on Security in Computing and Communication Springer doi 10 1007 978 981 10 2738 3 40 Guo Chuanxiong Wang Helen Zhu Wenwu November 2004 Smart Phone Attacks and Defenses PDF ACM SIGCOMM HotNets Association for Computing Machinery Inc Retrieved March 31 2012 Halbronn Cedric Sigwald John 2010 Vulnerabilities amp iPhone Security Model PDF HITB SecConf 2010 Archived from the original PDF on 2013 02 02 Retrieved 2012 04 21 Hogben Giles Dekker Marnix December 2010 Smartphones Information security Risks Opportunities and Recommendations for users ENISA Josang Audun Miralabe Laurent Dallot Leonard 2015 Vulnerability by Design in Mobile Network Security PDF Journal of Information Warfare JIF 14 4 ISSN 1445 3347 Malik Jyoti 2016 CREDROID Android malware detection by network traffic analysis Proceedings of the 1st ACM Workshop on Privacy Aware Mobile Computing Association for Computing Machinery Inc pp 28 36 doi 10 1145 2940343 2940348 Mickens James W Noble Brian D 2005 Modeling epidemic spreading in mobile environments WiSe 05 Proceedings of the 4th ACM workshop on Wireless security Association for Computing Machinery Inc pp 77 86 doi 10 1145 1080793 1080806 Mulliner Collin Richard 2006 Security of Smart Phones PDF M Sc thesis University of California Santa Barbara Pandya Vaibhav Ranchhoddas 2008 Iphone Security Analysis PDF Thesis San Jose State University Raboin Romain December 2009 La securite des smartphones PDF Symposium sur la securite des technologies de l information et des communications 2009 SSTIC09 in French Racic Radmilo Ma Denys Chen Hao 2006 Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone s Battery PDF Dissertation University of California Davis Roth Volker Polak Wolfgang Rieffel Eleanor 2008 Simple and Effective Defense Against Evil Twin Access Points ACM SIGCOMM HotNets doi 10 1145 1352533 1352569 ISBN 978 1 59593 814 5 Ruff Nicolas 2011 Securite du systeme Android PDF Symposium sur la securite des technologies de l information et des communications 2011 SSTIC11 in French Ruggiero Paul Foote Jon 2011 Cyber Threats to Mobile Phones PDF thesis US CERT Schmidt Aubrey Derrick Schmidt Hans Gunther Clausen Jan Yuksel Kamer Ali Kiraz Osman Camtepe Ahmet Albayrak Sahin October 2008 Enhancing Security of Linux based Android Devices PDF Proceedings of 15th International Linux Kongress Schmidt Aubrey Derrick Schmidt Hans Gunther Batyuk Leonid Clausen Jan Hendrik Camtepe Seyit Ahmet Albayrak Sahin April 2009a Smartphone Malware Evolution Revisited Android Next Target PDF 4th International Conference on Malicious and Unwanted Software MALWARE ISBN 978 1 4244 5786 1 Retrieved 2010 11 30 Shabtai Asaf Fledel Yuval Kanonov Uri Elovici Yuval Dolev Shlomi 2009 Google Android A State of the Art Review of Security Mechanisms arXiv 0912 5101v1 cs CR Thirumathyam Rubathas Derawi Mohammad O 2010 Biometric Template Data Protection in Mobile Device Using Environment XML database 2010 2nd International Workshop on Security and Communication Networks IWSCN ISBN 978 1 4244 6938 3 Archived from the original on 2013 02 12 Toyssy Sampo Helenius Marko 2006 About malicious software in smartphones Journal in Computer Virology 2 2 109 119 doi 10 1007 s11416 006 0022 0 S2CID 9760466 Websites edit European Telecommunications Standards Institute 2011 3GPP Confidentiality and Integrity Algorithms amp UEA1 UIA1 Archived from the original on 12 May 2012 Siemens 2010 Series M Siemens SMS DoS Vulnerability Further reading edit Securisation de la mobilite PDF CIGREF in French October 2010 Chong Wei Hoo November 2007 iDEN Smartphone Embedded Software Testing PDF Fourth International Conference on Information Technology 2007 ITNG 07 doi 10 1109 ITNG 2007 103 ISBN 978 0 7695 2776 5 Jansen Wayne Scarfone Karen October 2008 Guidelines on Cell Phone and PDA Security Recommendations of the National Institute of Standards and Technology PDF National Institute of Standards and Technology doi 10 6028 NIST SP 800 124 Retrieved April 21 2012 Murugiah P Souppaya Scarfone Karen June 21 2013 Guidelines for Managing the Security of Mobile Devices in the Enterprisewebsite National Institute of Standards and Technology NIST doi 10 6028 NIST SP 800 124r1 Lee Sung Min Suh Sang bum Jeong Bokdeuk Mo Sangdok January 2008 A Multi Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization 5th IEEE Consumer Communications and Networking Conference 2008 CCNC 2008 doi 10 1109 ccnc08 2007 63 ISBN 978 1 4244 1456 7 Li Feng Yang Yinying Wu Jie March 2010 CPMC An Efficient Proximity Malware Coping Scheme in Smartphone based Mobile Networks PDF INFOCOM 2010 Proceedings IEEE doi 10 1109 INFCOM 2010 5462113 Ni Xudong Yang Zhimin Bai Xiaole Champion Adam C Xuan Dong October 2009 Distribute Differentiated User Access Control on Smartphones 6th IEEE International Conference on Mobile Adhoc and Periodic Sensor Systems 2009 MASS 09 ISBN 978 1 4244 5113 5 Ongtang Machigar McLaughlin Stephen Enck William Mcdaniel Patrick December 2009 Semantically Rich Application Centric Security in Android PDF Annual Computer Security Applications Conference 2009 ACSAC 09 Annual Computer Security Applications Conference Acsac ISSN 1063 9527 Schmidt Aubrey Derrick Bye Rainer Schmidt Hans Gunther Clausen Jan Kiraz Osman Yuksel Kamer A Camtepe Seyit A Albayrak Sahin 2009b Static Analysis of Executables for Collaborative Malware Detection on Android PDF IEEE International Conference Communications 2009 ICC 09 Communications 2009 Icc 09 IEEE International Conference on ISSN 1938 1883 Yang Feng Zhou Xuehai Jia Gangyong Zhang Qiyuan 2010 A Non cooperative Game Approach for Intrusion Detection Systems in Smartphone systems 8th Annual Communication Networks and Services Research Conference doi 10 1109 CNSR 2010 24 ISBN 978 1 4244 6248 3 Retrieved from https en wikipedia org w index php title Mobile security amp oldid 1194652115, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.