In these last years, mobile devices, such as mobile phones and tablets, became very popular among people. Moreover, mobile devices became very powerful, and commonly run fairly complex applications such as 3D games, Internet browsers, e-mail clients, social network clients, and many others. Hence, an adequate security support is required on these devices, to avoid that malicious applications damage the device or perform unauthorized accesses to personal data (such as personal contacts or business mails). This chapter describes the security support of the current commercial mobile devices along with a set of approaches that have been proposed in the scientific literature to enhance the security of mobile applications.
Application Security for Mobile Devices
Aliaksandr Lazouski;Fabio Martinelli;Paolo Mori
2014
Abstract
In these last years, mobile devices, such as mobile phones and tablets, became very popular among people. Moreover, mobile devices became very powerful, and commonly run fairly complex applications such as 3D games, Internet browsers, e-mail clients, social network clients, and many others. Hence, an adequate security support is required on these devices, to avoid that malicious applications damage the device or perform unauthorized accesses to personal data (such as personal contacts or business mails). This chapter describes the security support of the current commercial mobile devices along with a set of approaches that have been proposed in the scientific literature to enhance the security of mobile applications.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.