Browse > Article
http://dx.doi.org/10.9708/jksci.2011.16.2.153

Analysis of Threats and Countermeasures on Mobile Smartphone  

Jeon, Woong-Ryul (Sungkyunkwan University)
Kim, Jee-Yeon (Sungkyunkwan University)
Lee, Young-Sook (Howon University)
Won, Dong-Ho (Sungkyunkwan University)
Abstract
Smartphone is a mobile device which can perform better than feature phone. Recently, growth in demand for advanced mobile devices boasting powerful performance, market share of smartphone is increasing rapidly in mobile device market, for example, iphone and android phone. Smartphone can provide many functionalities, e-mail, scheduler, word-processing, 3D-game, and etc, based on its powerful performance. Thus, various secret information is integrated in smartphone. To provide service, sometimes, smartphone transmits informations to outside via wireless network. Because smartphone is a mobile device, user can lose his/her smartphone, easily, and losing smartphone can cause serious security threats, because of integrated information in smartphone. Also data which is transmitted in wireless network can be protected for privacy. Thus, in present, it is very important to keep secure smartphone. In this paper, we analyze threats and vulnerabilities of smartphone based on its environments and describe countermeasures against threats and vulnerabilities.
Keywords
Smartphone; Threats of Smartphone; Security; Countermeasure;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Collin Richard Mulliner, "Security of Smart Phone," Master's Thesis of University of California, 2006. 06.
2 Andrew Monk, Evi Fellas, Eleanor Ley, "Hearing only one side of normal and mobile phone conversations," Behaviour & Informaion Technology, Volume 23, Issue 5, 2004. 09.
3 http://threatcenter.smobilesystems.com
4 Xudong Ni, Zhimin Yang, Xiaole Bai, Adam C. Champion, and Dong Xuan, "DiffUser : Differentiated User Access Control on Smartphones," Proc. 5th IEEE Int'l. Workshop on Wireless and Sensor Networks Security (WSNS '09), 2009. 09.
5 Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Jan Clausen, Ahmet Camtepe, and Sahin Albayrak, "Enhancing Security of Linux-Based Android Devices," 15th International Linux Kongress, 2008. 10.
6 Jengchung V. Chen, David C. Yen, Kuanchin Chen, "The acceptance and diffusion of the innovative smart phone use: A case study of a delivery service company in logistics," Information & Management Volume 46, Issue 4, 2009. 03.
7 http://seriot.ch/resources/talks_papers/iPhonePrivacy.pdf
8 http://www.mt.co.kr/view/mtview.php
9 Asaf Shabtai, Yuval Fledel, Uri Kanonov, Yuval Elovici, Shlomi Dolev, "Google Android : A State of the Art Review of Security Mechanisms", arXiv 2009, 2009. 11.
10 Chuanxiong Guo, Helen J. Wang, Wenwu Zhu, "Smart-Phone Attacks and Defenses," HotNets III, 2004. 11.