ASSESSMENT OF MOBILE SECURITY PLATFORMS
Germán Retamosa, Jorge E. López de Vergara
2009
Abstract
Mobility is one of the most important features in users’ communications. The increasing progress carried out by mobile communications has changed the concept of mobile phone. Nowadays, each new device offers newer technologies and services adapted to user requirements. However, each added improvement has a set of threats, which have to be taken into account for ensuring the confidentiality, integrity and availability of user and system data. In this paper, we analyze some important mobile security platforms, such as Symbian OS, Windows Mobile and iPhone OS. Then, we compare these platforms giving some advantages and drawbacks of each one and providing some conclusions about this study.
References
- Heath, C., 2006. Symbian OS Security Platform. Wiley.
- Savoldi, A., Gubian, P., 2008, Symbian Forensics: An Overview. IIHMSP 7808.
- Zdziarski, J., 2008, iPhone Forensics. O'Reilly.
- Miller, C., Honoroff, J., Mason J., 2007. Security Evaluation of Apple's iPhone. Independent Security Evaluators.
- Apple Inc., 2008, Security Overview.
- Microsoft, 2007, Security Model for Windows Mobile 5 and Windows Mobile 6.
- Moreno, A., 2008, Windows Mobile Security Model, http://www.seguridadmobile.com/windowsmobile/seguridad-windows-mobile/ejecucionaplicaciones.html
- Moreno, A., 2009, BD_ADDR Spoofing, http://www.seguridadmobile.com/bluetooth/seguridadbluetooth/BD_ADDR-spoofing.html.
- Symbian Software Ltd., 2009, http://www.sym bian.com/index.asp
- Microsoft, 2009, http://www.microsoft.com/windowsmobile/ es-es/default.mspx
- Apple Inc., 2009, http://developer.apple.com/iphone/
- LG Electronics, 2009, http://www.lge.com/
- Dunham, K., 2009. Mobile Malware Attacks and Defense. Elsevier.
- Bluetooth SIG, 2009, https://www.bluetooth.org/ apps/content/
- Gostev, A., 2008. Mobile Virology Introduction. Hakin9.
- MMS, 2003, 3GPP MMS Specification, http://www.3gpp.org/ftp/Specs/html-info/23140.htm
Paper Citation
in Harvard Style
Retamosa G. and E. López de Vergara J. (2009). ASSESSMENT OF MOBILE SECURITY PLATFORMS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 127-132. DOI: 10.5220/0002261101270132
in Bibtex Style
@conference{secrypt09,
author={Germán Retamosa and Jorge E. López de Vergara},
title={ASSESSMENT OF MOBILE SECURITY PLATFORMS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={127-132},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002261101270132},
isbn={978-989-674-005-4},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - ASSESSMENT OF MOBILE SECURITY PLATFORMS
SN - 978-989-674-005-4
AU - Retamosa G.
AU - E. López de Vergara J.
PY - 2009
SP - 127
EP - 132
DO - 10.5220/0002261101270132