Nowadays, mobile devices are an important part of our everyday lives since they enable us to access a large variety of ubiquitous services. In recent years, the availability of these ubiquitous and mobile services has significantly increased due to the different form of connectivity provided by mobile devices, such as GSM, GPRS, Bluetooth and Wi-Fi. In the same trend, the number and typologies of vulnerabilities exploiting these services and communication channels have increased as well. Therefore, smartphones may now represent an ideal target for malware writers. As the number of vulnerabilities and, hence, of attacks increase, there has been a corresponding rise of security solutions proposed by researchers. Due to the fact that this research field is immature and still unexplored in depth, with this paper we aim to provide a structured and comprehensive overview of the research on security solutions for mobile devices. This paper surveys the state of the art on threats, vulnerabilities and security solutions over the period 2004-2011, by focusing on high-level attacks, such those to user applications. We group existing approaches aimed at protecting mobile devices against these classes of attacks into different categories, based upon the detection principles, architectures, collected data and operating systems, especially focusing on IDS-based models and tools. With this categorization we aim to provide an easy and concise view of the underlying model adopted by each approach.

A Survey on Security for Mobile Devices

La Polla Mariantonietta;Martinelli Fabio;Sgandurra Daniele
2012

Abstract

Nowadays, mobile devices are an important part of our everyday lives since they enable us to access a large variety of ubiquitous services. In recent years, the availability of these ubiquitous and mobile services has significantly increased due to the different form of connectivity provided by mobile devices, such as GSM, GPRS, Bluetooth and Wi-Fi. In the same trend, the number and typologies of vulnerabilities exploiting these services and communication channels have increased as well. Therefore, smartphones may now represent an ideal target for malware writers. As the number of vulnerabilities and, hence, of attacks increase, there has been a corresponding rise of security solutions proposed by researchers. Due to the fact that this research field is immature and still unexplored in depth, with this paper we aim to provide a structured and comprehensive overview of the research on security solutions for mobile devices. This paper surveys the state of the art on threats, vulnerabilities and security solutions over the period 2004-2011, by focusing on high-level attacks, such those to user applications. We group existing approaches aimed at protecting mobile devices against these classes of attacks into different categories, based upon the detection principles, architectures, collected data and operating systems, especially focusing on IDS-based models and tools. With this categorization we aim to provide an easy and concise view of the underlying model adopted by each approach.
2012
Istituto di informatica e telematica - IIT
Inglese
15
1
446
471
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6170530&isnumber=5451756
Sì, ma tipo non specificato
Mobile Security
Intrusion Detection
Trusted Mobile
ID_PUMA: cnr.iit/2012-A0-006 Manuscript received 17 February 2011; revised 7 November 2011. The authors are with Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche, Pisa, Italy Date of Publication : 15 marzo 2012 Date of Current Version : 05 febbraio 2013 Issue Date : First Quarter 2013
3
info:eu-repo/semantics/article
262
LA POLLA, MARIANTONIETTA NOEMI; Martinelli, Fabio; Sgandurra, Daniele
01 Contributo su Rivista::01.01 Articolo in rivista
none
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/126884
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 425
  • ???jsp.display-item.citation.isi??? 289
social impact