CFP last date
22 April 2024
Reseach Article

Mobile Application Security Platforms Survey

by Sardasht M. Mahmood, Bakhtiar M. Amen, Rebwar M. Nabi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 133 - Number 2
Year of Publication: 2016
Authors: Sardasht M. Mahmood, Bakhtiar M. Amen, Rebwar M. Nabi
10.5120/ijca2016907736

Sardasht M. Mahmood, Bakhtiar M. Amen, Rebwar M. Nabi . Mobile Application Security Platforms Survey. International Journal of Computer Applications. 133, 2 ( January 2016), 40-46. DOI=10.5120/ijca2016907736

@article{ 10.5120/ijca2016907736,
author = { Sardasht M. Mahmood, Bakhtiar M. Amen, Rebwar M. Nabi },
title = { Mobile Application Security Platforms Survey },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 133 },
number = { 2 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 40-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume133/number2/23761-2016907736/ },
doi = { 10.5120/ijca2016907736 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:30:03.572438+05:30
%A Sardasht M. Mahmood
%A Bakhtiar M. Amen
%A Rebwar M. Nabi
%T Mobile Application Security Platforms Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 133
%N 2
%P 40-46
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing Unit), Storage and installing numerous applications. Therefore, Security is considered as an important factor in wireless communication technologies, particularly in a wireless ad-hoc network and mobile operating systems. Moreover, based on increasing the range of mobile application within variety of platforms, security is regarded as on the most valuable and considerable debate in terms of issues, trustees, reliabilities and accuracy. This paper aims to introduce a consolidated report of thriving security on mobile application platforms and providing knowledge of vital threats to the users and enterprises. Furthermore, in this paper, various techniques as well as methods for security measurements, analysis and prioritization within the peak of mobile platforms will be presented. Additionally, increases understanding and awareness of security on mobile application platforms to avoid detection, forensics and countermeasures used by the operating systems. Finally, this study also discusses security extensions for popular mobile platforms and analysis for a survey within a recent research in the area of mobile platform security.

References
  1. Asokan, N., Davi, L., Dmitrienko, A., Heuser, S.,Kostiainen, K., Reshetova, E., Sadeghi, A. (2014) ‘Mobile Platform Security’, Morgan & cLaypool publishers
  2. Becher, M., Freiling, F., Hoffmann, J., Holz, T., Uellenbeck, S. and Wolf, C. (2011) ‘Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices’. 2011 IEEE Symposium on Security and Privacy.P 96-111.
  3. Benjamin, F., Seda, G., Maritta, H., and Holger, S. (2010)‘A comparision of security requirements engineering methods’, in requirement engineering.
  4. Bhattacharya,P.,Yang,L.,Guo,M.,Qian,K.,andYang,M.(2014), ‘Learning Mobile Security with Labware’, IEEE Security & Privacy
  5. Braun, P., and Rossak, W. (2005). ‘Mobile agents. Basic concepts, mobility models and the tracy toolkit’. dpunkt. verlag.
  6. Bürkle, A., Hertel, A., Müller, W. and Wieser, M. (2008) “Evaluating the security of mobile agent platforms’ Springer Science+Business Media, LLC 2008
  7. Certic, S. (Not Given), ‘The Future of Mobile Security’, CS Network Solutions Limited, [online]. Available at: http://www.cs-networks.net [Accessed 4th September 2014].
  8. Chen, M. (Not given), A methodology for building mobile computing applications, USA
  9. Clarke,N. & Furnell, S. (2007). ‘Advanced user authentication for mobile devices’. Computers & Security, vol.26, (2), pp. 109-119 [online]. Available at: http://www.sciencedirect.com.libaccess.hud.ac.uk/science/article/pii/S0167404806001428 [Accessed 7th May 2014].
  10. Delac, G. Silic, M. and Krolo, J. (2011), Emerging Security Threats for Mobile Platforms’ MIPRO 2011, May 23-27, 2011, Opatija, Croatia
  11. Dimensional Research, (2014), The Impact of Mobile Devices on Information Security: A Survey of IT and Security Professionals, [online]. Available at: https://www.checkpoint.com/downloads/product-related/report/check-point-capsule-2014-mobile-security-survey-report.pdf [Accessed 4th October 2015].
  12. Finneran, M. (2011). ‘Mobile App Development Needs A New Approach’. Informationweek [online]. Available at: http://www.informationweek.com/mobile/mobile-app-development-needs-a-new-approach/d/d- id/1099351?page_number=1 [Accessed 4th September 2014].
  13. Flora, H. and Chande, S. (2013). ‘A review and analysis on mobile application development processes using agile methodologies’, International Journal of Research in Computer Science, eISSN 2249-8265 Volume 3 Issue 2 (2013) pp. 9-18 www.ijorcs.org, A Unit of White Globe Publications
  14. F-Secure Lab, (2013). ‘Mobile Threat Report’ [online].Availableat: http://www.fsecure.com/documents/996508/1030743 /Mobile_Threat_Report_Q3_2013.pdf [Accessed 4th September 2014].
  15. Gehrmann, C. and Ståhl, P. (2006) ‘Mobile platform security’ Ericsson Review No. 2
  16. Geirland, J. (2002). ‘The feature: mobile intelligent Agents’.[online].Availableat:http://www.thefeature.com/article?articleid=26051 [Accessed 4th September 2014].
  17. Gupta, A., Jaiswal, B. and Tewari, C. (2013). ‘Security Requirements Engineering: Analysis and Prioritization’. In Proceedings of the International conference on Software Engineering Research and Practice, 2013. Page 38-45, Las Vegas
  18. Healey, M. (2011). The OS Mess: 5 Ways to Take Control. Informationweek [online]. Available at: http://www.informationweek.com/it-leadership/the-os-mess-5-ways-to-take-control/d/d-id/1098641? [Accessed 4th September 2014].
  19. IDC.com (2015). Smartphone OS Market Share, 2015 Q2 [online]. Available at: http://www.idc.com/prodserv/smartphone-os-market-share.jsp [Accessed 4th September 2015].
  20. ITU.int, (2015), ICT Facts and Figures: The World in 2015, [online]. Available at: http://www.itu.int/en/ITU-D/Statistics/Pages/facts/default.aspx [Accessed 4th October 2015].
  21. JRivera, J. and Van der Meulen, R. (2014). ‘Gartner Says Annual Smartphone Sales Surpassed Sales of Feature Phones for the First Time in 2013’.
  22. Luo, J. and Kang, M., (2011), "Application Lockbox for Mobile Device Security," Information Technology: New Generations (ITNG), 2011 Eighth International Conference, pp.336-341, 11-13 April 2011
  23. Mahmood. S. (2013). ‘An investigation into mobile based approach for healthcare activities - Occupational Therapy System’. In Proceedings of the International conference on Software Engineering Research and Practice, 2013. Page 95-101, Las Vegas
  24. Mcafee (2015), “Threats Predictions”, [online]. Available at: http://www.mcafee.com/es/resources/misc/infographic-threats-predictions-2015.pdf [Accessed 4th September 2014].
  25. Mike Park. (2012). ‘Mobile Application Security: Who, How and Why’ Trustwave SpiderLabs
  26. My First Mobile App – Apps World, (2014) ‘Mobile application design & development trends -2013’
  27. Petkovic, M. & Jonker, W. (Eds) (2007). Security, Privacy, and Trust in Modern Data Management. Verlag: Springer
  28. Potter, B. (2007). ‘Mobile security risks: ever evolving’. Network Security, vol.2007. (8).pp. 19-20
  29. Qing L. and Greg C., (2013), Mobile Security: A Look Ahead, IEEE Security & Privacy
  30. Rowan, M. and Dehlinger, J. (2013). ‘Research Trends and Open Issues in Mobile Application Software Engineering’. In Proceedings of the International conference on Software Engineering Research and Practice, 2013. Page 38-45, Las Vegas
  31. Scandariato, R. and Walden, J. (2012). ‘Predicting vulnerableclassesinanAndroidapplication’.InProceedingsofthe4thinternationalworshop on Security measurements and metrics,ACM, USA, 11-16.
  32. Statista.com, (2015), Number of apps available in leading app stores as of July 2015, [online]. Available at: http://www.statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores/ [Accessed 4th October 2015].
  33. Veikko, I., Eija, K. & Marketta, N. (2009). ‘Defining Ethical Guidelines for Ambient Intelligence Applications on a Mobile Phone’. In: Proceedings of the 1stInternational Conference on Intelligent Environment (IE09), 20-21 July 2009, Technical University ofCatalonia, Barcelona. [online]. Available at: https://www.dora.dmu.ac.uk/handle/2086/5295 [Accessed 25th July 2014].
  34. Wang, T., Lu, K., Lu. L., Chung, S., and Lee, W. (2013). ‘Jekyll on iOS: When benign apps become evil’. In USENIX Security Symposium, 78
  35. Yao, H., Lian, L., Fan, Y., Liang, Q., and Yan, X. (2013), ‘The Evaluation of Security Algorithms on Mobile Platform’, IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks
Index Terms

Computer Science
Information Sciences

Keywords

Threats cyber strategy mobile platforms security security awareness sensitive data and vulnerability.