1,546 research outputs found

    How Smart is your Android Smartphone?

    Get PDF
    Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers. A virus or worm that spreads over the network to cell phone users could be particularly damaging. Due to a rising demand for secure mobile phones, manufacturers have increased their emphasis on mobile security. In this project, we address some security issues relevant to the current Android smartphone framework. Specifically, we demonstrate an exploit that targets the Android telephony service. In addition, as a defense against the loss of personal information, we provide a means to encrypt data stored on the external media card. While smartphones remain vulnerable to a variety of security threats, this encryption provides an additional level of security

    The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

    Full text link
    In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world. Mobile devices are used not only for traditional communication activities (e.g., voice calls and messages) but also for more advanced tasks made possible by an enormous amount of multi-purpose applications (e.g., finance, gaming, and shopping). As a result, those devices generate a significant network traffic (a consistent part of the overall Internet traffic). For this reason, the research community has been investigating security and privacy issues that are related to the network traffic generated by mobile devices, which could be analyzed to obtain information useful for a variety of goals (ranging from device security and network optimization, to fine-grained user profiling). In this paper, we review the works that contributed to the state of the art of network traffic analysis targeting mobile devices. In particular, we present a systematic classification of the works in the literature according to three criteria: (i) the goal of the analysis; (ii) the point where the network traffic is captured; and (iii) the targeted mobile platforms. In this survey, we consider points of capturing such as Wi-Fi Access Points, software simulation, and inside real mobile devices or emulators. For the surveyed works, we review and compare analysis techniques, validation methods, and achieved results. We also discuss possible countermeasures, challenges and possible directions for future research on mobile traffic analysis and other emerging domains (e.g., Internet of Things). We believe our survey will be a reference work for researchers and practitioners in this research field.Comment: 55 page

    A Survey of the Economic Role of Software Platforms in Computer-Based Industries

    Get PDF
    Software platforms are a critical component of the computer systems underpinning leading– edge products ranging from third– generation mobile phones to video games. After describing some key economic features of computer systems and software platforms, the paper presents case studies of personal computers, video games, personal digital assistants, smart mobile phones, and digital content devices. It then compares several economic aspects of these businesses including their industry evolution, pricing structures, and degrees of integration.software platforms, hardware platforms, network effects, bundling, multi-sided markets

    DO CONSUMERS CARE ABOUT MOBILE SERVICE PLATFORMS? A CONJOINT ANALYSIS ON CONSUMER PREFERENCE FOR MOBILE PLATFORMS

    Get PDF
    Literature on Mobile Platforms focuses predominantly on strategic issues in managing multi-sided platforms as well as economic issues of two-sided markets. Most of this literature is highly conceptual and empirical research on the perceptions, preferences and behaviour of consumers is lacking. Moreover, scholars typically focus on device-related platforms like operating systems and app stores, while platforms developed by mobile operators are seldom discussed explicitly. In this paper, we therefore aim to understand the criteria and expectations of consumers to opt for a specific platform from a device manufacturer or operator. To do so, we developed and executed a questionnaire for conjoint analysis. The data for the conjoint analysis was collected from 88 Chinese researchers and students. The conjoint results show that most respondents strongly prefer mobile operating systems provided by Apple (iOS) and Google (Android) over Nokia (Symbian) and BlackBerry OS. Moreover, application cost is considered to play an important role in the decision making of consumers to opt a platform. The findings of the study indicate that respondents hardly find the provider of the platform important, i.e. they prefer service provider and device provider platforms over operator platforms

    Symbian operativni sustav za mobilne telefone

    Get PDF
    New mobile devices require powerful hardware and software to support customer\u27s needs which grew rapidly in the last few years. Demanding user interface depends of the operating system, and Symbian created operating system that seems powerful enough to support forthcoming burst of data services in the mobile world. Symbian OS is the common core of application programming interfaces (APIs) and technology that is shared by all Symbian OS phones. Symbian OS includes a multi-tasking kernel, middleware for communications, data management and graphics, the lower levels of the GUI framework, and application engines.Novi mobilni uređaji moraju imati napredan hardver i softver da bi mogli ispuniti korisničke zahtjeve koji su znatno porasli u posljednjih nekoliko godina. Korisničko sučelje ovisi o operativnom sustavu, a Symbian je stvorio operativni sustav koji je dovoljno snažan da može podržati porast podatkovnih usluga u mobilnom svijetu. Symbian OS je zajednička jezgra za aplikacijska sučelja (API – application programming interface) i tehnologiju koju dijele svi Symbian OS telefoni. Symbian OS uključuje multitasking kernel, komunikacijske i podatkovne protokole, grafičko sučelje i aplikacijske strojeve

    Building distributed heterogeneous smart phone Java applications an evaluation from a development perspective

    Get PDF
    The advances in mobile phone technology have enabled such devices to be programmed to run general-purpose applications using a special edition of the Java programming language. Java is designed to be a heterogeneous programming language targeting different platforms. Such ability when coupled with the provision of high-speed mobile Internet access would open the door for a new breed of distributed mobile applications. This paper explores the capabilities and limitations of this technology and addresses the considerations that must be taken when designing and developing such distributed applications. Our findings are verified by building a test client-server system where the clients in this system are mobile phones behaving as active processing elements not just mere service requesters

    Code White: A Signed Code Protection Mechanism for Smartphones

    Get PDF
    This research develops Code White, a hardware-implemented trusted execution mechanism for the Symbian mobile operating system. Code White combines a signed whitelist approach with the execution prevention technology offered by the ARM architecture. Testing shows that it prevents all untrusted user applications from executing while allowing all trusted applications to load and run. Performance testing in contrast with an unmodified Symbian system shows that the difference in load time increases linearly as the application file size increases. The predicted load time for an application with a one megabyte code section remains well below one second, ensuring uninterrupted experience for the user. Smartphones have proven to be invaluable to military, civic, and business users due in a large part to their ability to execute code just like any desktop computer can. While many useful applications have been developed for these users, numerous malicious programs have also surfaced. And while smartphones have desktop-like capabilities to execute software, they do not have the same resources to scan for malware. More efficient means, like Code White, which minimize resource usage are needed to protect the data and capabilities found in smartphones
    • …
    corecore