ASSESSMENT OF MOBILE SECURITY PLATFORMS

Germán Retamosa, Jorge E. López de Vergara

2009

Abstract

Mobility is one of the most important features in users’ communications. The increasing progress carried out by mobile communications has changed the concept of mobile phone. Nowadays, each new device offers newer technologies and services adapted to user requirements. However, each added improvement has a set of threats, which have to be taken into account for ensuring the confidentiality, integrity and availability of user and system data. In this paper, we analyze some important mobile security platforms, such as Symbian OS, Windows Mobile and iPhone OS. Then, we compare these platforms giving some advantages and drawbacks of each one and providing some conclusions about this study.

References

  1. Heath, C., 2006. Symbian OS Security Platform. Wiley.
  2. Savoldi, A., Gubian, P., 2008, Symbian Forensics: An Overview. IIHMSP 7808.
  3. Zdziarski, J., 2008, iPhone Forensics. O'Reilly.
  4. Miller, C., Honoroff, J., Mason J., 2007. Security Evaluation of Apple's iPhone. Independent Security Evaluators.
  5. Apple Inc., 2008, Security Overview.
  6. Microsoft, 2007, Security Model for Windows Mobile 5 and Windows Mobile 6.
  7. Moreno, A., 2008, Windows Mobile Security Model, http://www.seguridadmobile.com/windowsmobile/seguridad-windows-mobile/ejecucionaplicaciones.html
  8. Moreno, A., 2009, BD_ADDR Spoofing, http://www.seguridadmobile.com/bluetooth/seguridadbluetooth/BD_ADDR-spoofing.html.
  9. Symbian Software Ltd., 2009, http://www.sym bian.com/index.asp
  10. Microsoft, 2009, http://www.microsoft.com/windowsmobile/ es-es/default.mspx
  11. Apple Inc., 2009, http://developer.apple.com/iphone/
  12. LG Electronics, 2009, http://www.lge.com/
  13. Dunham, K., 2009. Mobile Malware Attacks and Defense. Elsevier.
  14. Bluetooth SIG, 2009, https://www.bluetooth.org/ apps/content/
  15. Gostev, A., 2008. Mobile Virology Introduction. Hakin9.
  16. MMS, 2003, 3GPP MMS Specification, http://www.3gpp.org/ftp/Specs/html-info/23140.htm
Download


Paper Citation


in Harvard Style

Retamosa G. and E. López de Vergara J. (2009). ASSESSMENT OF MOBILE SECURITY PLATFORMS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 127-132. DOI: 10.5220/0002261101270132


in Bibtex Style

@conference{secrypt09,
author={Germán Retamosa and Jorge E. López de Vergara},
title={ASSESSMENT OF MOBILE SECURITY PLATFORMS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={127-132},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002261101270132},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - ASSESSMENT OF MOBILE SECURITY PLATFORMS
SN - 978-989-674-005-4
AU - Retamosa G.
AU - E. López de Vergara J.
PY - 2009
SP - 127
EP - 132
DO - 10.5220/0002261101270132