Title :
A leaky bucket called smartphone
Author :
Ugus, Osman ; Westhoff, Dirk ; Rajasekaran, Hariharan
Author_Institution :
Hamburg Univ. of Appl. Sci. Hamburg, Hamburg, Germany
Abstract :
This work is a survey presenting attacks on smartphones and recommending the best possible locations for deploying defensive mechanisms to mitigate those attacks. The attack vectors are categorized into three classes according to their characteristics as attacks via application layer, communication layer and operating system layer. We describe various attacks belonging to each of these classes and suggest locations where defensive mechanisms could be deployed to mitigate them. This paper does not intend to present a complete list of attacks. It rather tries to evaluate the best possible place for implementing the potential countermeasures to either prevent or to detect attacks with similar characteristics. The focus of this work is therefore to present a set of representative attacks on smartphone specific services and to identify meaningful locations where particular countermeasures available from the literature could be installed.
Keywords :
data privacy; mobile computing; operating systems (computers); smart phones; vectors; application layer; attack detection; attack prevention; attack vectors; communication layer; defensive mechanism; leaky bucket; operating system layer; smartphone specific services; Baseband; Batteries; Bluetooth; Browsers; Mobile communication; Protocols; Security;
Conference_Titel :
Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on
Conference_Location :
Lugano
Print_ISBN :
978-1-4673-0905-9
Electronic_ISBN :
978-1-4673-0906-6
DOI :
10.1109/PerComW.2012.6197513