Mobile application security: malware threats and defenses
Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distri...
Gespeichert in:
Veröffentlicht in: | IEEE wireless communications 2015-02, Vol.22 (1), p.138-144 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 144 |
---|---|
container_issue | 1 |
container_start_page | 138 |
container_title | IEEE wireless communications |
container_volume | 22 |
creator | Daojing He Chan, Sammy Guizani, Mohsen |
description | Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. This issue should be addressed by both preventive approaches and effective detection techniques. This article first discusses why smartphones are vulnerable to security attacks. Then it presents malicious behavior and threats of malware. Next, it reviews the existing malware prevention and detection techniques. Besides more research in these directions, it points out efforts from app developers, app store administrators, and users, who are also required to defend against such malware. |
doi_str_mv | 10.1109/MWC.2015.7054729 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_MWC_2015_7054729</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7054729</ieee_id><sourcerecordid>1800432198</sourcerecordid><originalsourceid>FETCH-LOGICAL-c324t-112e2ec5fb2153bb3f8146cba31093ae6b344256acd28150817068b7a2c988263</originalsourceid><addsrcrecordid>eNpdkE1Lw0AQhhdRsFbvgpeAFy-pO_uVjTcpfkGLF8XjstlOcEuaxN0E6b93S6sHTzMwzzu8PIRcAp0B0PJ2-TGfMQpyVlApClYekQlIqXOqdHG827nKgWlxSs5iXFMKhZJqQsplV_kGM9v3jXd28F2bRXRj8MP2LtvY5tsGzIbPgHaImW1X2QprbCPGc3JS2ybixWFOyfvjw9v8OV-8Pr3M7xe540wMOQBDhk7WFUsdqorXGoRyleWpNbeoKi4Ek8q6FdMgqYYiVa4Ky1ypNVN8Sm72f_vQfY0YB7Px0WHT2Ba7MRrQlArOoNQJvf6HrrsxtKmdAaU4p5LJMlF0T7nQxRiwNn3wGxu2BqjZuTTJpdm5NAeXKXK1j3hE_MN_rz8rs22T</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1663305259</pqid></control><display><type>article</type><title>Mobile application security: malware threats and defenses</title><source>IEEE Electronic Library (IEL)</source><creator>Daojing He ; Chan, Sammy ; Guizani, Mohsen</creator><creatorcontrib>Daojing He ; Chan, Sammy ; Guizani, Mohsen</creatorcontrib><description>Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. This issue should be addressed by both preventive approaches and effective detection techniques. This article first discusses why smartphones are vulnerable to security attacks. Then it presents malicious behavior and threats of malware. Next, it reviews the existing malware prevention and detection techniques. Besides more research in these directions, it points out efforts from app developers, app store administrators, and users, who are also required to defend against such malware.</description><identifier>ISSN: 1536-1284</identifier><identifier>EISSN: 1558-0687</identifier><identifier>DOI: 10.1109/MWC.2015.7054729</identifier><identifier>CODEN: IWCEAS</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Applications programs ; Availability ; Computer hacking ; Computer information security ; Electronic mail ; Malware ; Mobile communication ; Mobile communication systems ; Smart phones ; Smartphones ; Spyware ; Stores ; Upgrading</subject><ispartof>IEEE wireless communications, 2015-02, Vol.22 (1), p.138-144</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2015</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c324t-112e2ec5fb2153bb3f8146cba31093ae6b344256acd28150817068b7a2c988263</citedby><cites>FETCH-LOGICAL-c324t-112e2ec5fb2153bb3f8146cba31093ae6b344256acd28150817068b7a2c988263</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7054729$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7054729$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Daojing He</creatorcontrib><creatorcontrib>Chan, Sammy</creatorcontrib><creatorcontrib>Guizani, Mohsen</creatorcontrib><title>Mobile application security: malware threats and defenses</title><title>IEEE wireless communications</title><addtitle>WC-M</addtitle><description>Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. This issue should be addressed by both preventive approaches and effective detection techniques. This article first discusses why smartphones are vulnerable to security attacks. Then it presents malicious behavior and threats of malware. Next, it reviews the existing malware prevention and detection techniques. Besides more research in these directions, it points out efforts from app developers, app store administrators, and users, who are also required to defend against such malware.</description><subject>Applications programs</subject><subject>Availability</subject><subject>Computer hacking</subject><subject>Computer information security</subject><subject>Electronic mail</subject><subject>Malware</subject><subject>Mobile communication</subject><subject>Mobile communication systems</subject><subject>Smart phones</subject><subject>Smartphones</subject><subject>Spyware</subject><subject>Stores</subject><subject>Upgrading</subject><issn>1536-1284</issn><issn>1558-0687</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1Lw0AQhhdRsFbvgpeAFy-pO_uVjTcpfkGLF8XjstlOcEuaxN0E6b93S6sHTzMwzzu8PIRcAp0B0PJ2-TGfMQpyVlApClYekQlIqXOqdHG827nKgWlxSs5iXFMKhZJqQsplV_kGM9v3jXd28F2bRXRj8MP2LtvY5tsGzIbPgHaImW1X2QprbCPGc3JS2ybixWFOyfvjw9v8OV-8Pr3M7xe540wMOQBDhk7WFUsdqorXGoRyleWpNbeoKi4Ek8q6FdMgqYYiVa4Ky1ypNVN8Sm72f_vQfY0YB7Px0WHT2Ba7MRrQlArOoNQJvf6HrrsxtKmdAaU4p5LJMlF0T7nQxRiwNn3wGxu2BqjZuTTJpdm5NAeXKXK1j3hE_MN_rz8rs22T</recordid><startdate>201502</startdate><enddate>201502</enddate><creator>Daojing He</creator><creator>Chan, Sammy</creator><creator>Guizani, Mohsen</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>L7M</scope></search><sort><creationdate>201502</creationdate><title>Mobile application security: malware threats and defenses</title><author>Daojing He ; Chan, Sammy ; Guizani, Mohsen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c324t-112e2ec5fb2153bb3f8146cba31093ae6b344256acd28150817068b7a2c988263</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Applications programs</topic><topic>Availability</topic><topic>Computer hacking</topic><topic>Computer information security</topic><topic>Electronic mail</topic><topic>Malware</topic><topic>Mobile communication</topic><topic>Mobile communication systems</topic><topic>Smart phones</topic><topic>Smartphones</topic><topic>Spyware</topic><topic>Stores</topic><topic>Upgrading</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Daojing He</creatorcontrib><creatorcontrib>Chan, Sammy</creatorcontrib><creatorcontrib>Guizani, Mohsen</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE wireless communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Daojing He</au><au>Chan, Sammy</au><au>Guizani, Mohsen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Mobile application security: malware threats and defenses</atitle><jtitle>IEEE wireless communications</jtitle><stitle>WC-M</stitle><date>2015-02</date><risdate>2015</risdate><volume>22</volume><issue>1</issue><spage>138</spage><epage>144</epage><pages>138-144</pages><issn>1536-1284</issn><eissn>1558-0687</eissn><coden>IWCEAS</coden><abstract>Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. This issue should be addressed by both preventive approaches and effective detection techniques. This article first discusses why smartphones are vulnerable to security attacks. Then it presents malicious behavior and threats of malware. Next, it reviews the existing malware prevention and detection techniques. Besides more research in these directions, it points out efforts from app developers, app store administrators, and users, who are also required to defend against such malware.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MWC.2015.7054729</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1536-1284 |
ispartof | IEEE wireless communications, 2015-02, Vol.22 (1), p.138-144 |
issn | 1536-1284 1558-0687 |
language | eng |
recordid | cdi_crossref_primary_10_1109_MWC_2015_7054729 |
source | IEEE Electronic Library (IEL) |
subjects | Applications programs Availability Computer hacking Computer information security Electronic mail Malware Mobile communication Mobile communication systems Smart phones Smartphones Spyware Stores Upgrading |
title | Mobile application security: malware threats and defenses |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T08%3A57%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Mobile%20application%20security:%20malware%20threats%20and%20defenses&rft.jtitle=IEEE%20wireless%20communications&rft.au=Daojing%20He&rft.date=2015-02&rft.volume=22&rft.issue=1&rft.spage=138&rft.epage=144&rft.pages=138-144&rft.issn=1536-1284&rft.eissn=1558-0687&rft.coden=IWCEAS&rft_id=info:doi/10.1109/MWC.2015.7054729&rft_dat=%3Cproquest_RIE%3E1800432198%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1663305259&rft_id=info:pmid/&rft_ieee_id=7054729&rfr_iscdi=true |