SMARTPHONE SECURITY EVALUATION - The Malware Attack Case

Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis

2011

Abstract

The adoption of smartphones, devices transforming from simple communication devices to ‘smart’ and multipurpose devices, is constantly increasing. Amongst the main reasons are their small size, their en¬hanced functionality and their ability to host many useful and attractive applications. However, this vast use of mobile platforms makes them an attractive target for conducting privacy and security attacks. This sce¬na¬rio increases the risk introduced by these attacks for personal mobile devices, given that the use of smar¬t¬phones as business tools may extend the perimeter of an organization’s IT infrastructure. Furthermore, smart¬¬phone platforms provide application developers with rich capabilities, which can be used to compro¬mi¬¬se the security and privacy of the device holder and her environment (private and/or organizational). This paper examines the feasibility of malware development in smartphone platforms by average programmers that have access to the official tools and programming libraries provided by smartphone platforms. Towards this direction in this paper we initially propose specific evaluation criteria assessing the security level of the well-known smartphone platforms (i.e. Android, BlackBerry, Apple iOS, Symbian, Windows Mobile), in terms of the development of malware. In the sequel, we provide a comparative analysis, based on a proof of concept study, in which the implementation and distribution of a location tracking malware is attempted. Our study has proven that, under circumstances, all smartphone platforms could be used by average de¬ve¬lo¬pers as privacy attack vectors, harvesting data from the device without the users knowledge and consent.

Download


Paper Citation


in Harvard Style

Mylonas A., Dritsas S., Tsoumas B. and Gritzalis D. (2011). SMARTPHONE SECURITY EVALUATION - The Malware Attack Case . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 25-36. DOI: 10.5220/0003446800250036

in Bibtex Style

@conference{secrypt11,
author={Alexios Mylonas and Stelios Dritsas and Bill Tsoumas and Dimitris Gritzalis},
title={SMARTPHONE SECURITY EVALUATION - The Malware Attack Case},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={25-36},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003446800250036},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - SMARTPHONE SECURITY EVALUATION - The Malware Attack Case
SN - 978-989-8425-71-3
AU - Mylonas A.
AU - Dritsas S.
AU - Tsoumas B.
AU - Gritzalis D.
PY - 2011
SP - 25
EP - 36
DO - 10.5220/0003446800250036