A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks

Abstract

Nowadays, the usage of smartphones and their applications have become rapidly popular in people’s daily life. Over the last decade, availability of mobile money services such as mobile-payment systems and app markets have significantly increased due to the different forms of apps and connectivity provided by mobile devices, such as 3G, 4G, GPRS, and Wi-Fi, etc. In the same trend, the number of vulnerabilities targeting these services and communication networks has raised as well. Therefore, smartphones have become ideal target devices for malicious programmers. With increasing the number of vulnerabilities and attacks, there has been a corresponding ascent of the security countermeasures presented by the researchers. Due to these reasons, security of the payment systems is one of the most important issues in mobile payment systems. In this survey, we aim to provide a comprehensive and structured overview of the research on security solutions for smartphone devices. This survey reviews the state of the art on security solutions, threats, and vulnerabilities during the period of 2011-2017, by focusing on software attacks, such those to smartphone applications. We outline some countermeasures aimed at protecting smartphones against these groups of attacks, based on the detection rules, data collections and operating systems, especially focusing on open source applications. With this categorization, we want to provide an easy understanding for users and researchers to improve their knowledge about the security and privacy of smartphones.

Authors and Affiliations

Milad Taleby Ahvanooey, Qianmu Li, Mahdi Rabbani, Ahmed Raza Rajput

Keywords

Related Articles

Mobility based Net Ordering for Simultaneous Escape Routing

With the advancement in electronics technology, number of pins under the ball grid array (BGA) are increasing on reduced size components. In small size components, a challenging task is to solve the escape routing proble...

Cloud Management and Governance: Adapting IT Outsourcing to External Provision of Cloud-Based IT Services

Outsourcing is a strategic option which complements IT services provided internally in organizations. The maturity model for IT service outsourcing (henceforth MM-2GES) is a new holistic maturity model based on standards...

Development of Adaptive Mobile Learning (AML) on Information System Courses

In general, the learning process is done conventionally, where the learning process is done face to face between teachers with learners in the classroom. Teachers have a very important role in determining the quantity an...

An Automated Surveillance System based on Multi-Processor System-on-Chip and Hardware Accelerator

The video surveillance, such as an example of security system presents one of the powerful techniques used in advanced systems. Manual vision which is used to analyze video in the traditional approach should be avoided....

Development of Rest Facility Information Exchange System by Utilizing Delay Tolerant Network

In this paper, we propose temporary rest facilities information exchange system among many people unable to get home by utilizing Delay Tolerant Network (DTN) after a disaster. When public transportation services are int...

Download PDF file
  • EP ID EP260730
  • DOI 10.14569/IJACSA.2017.081005
  • Views 100
  • Downloads 0

How To Cite

Milad Taleby Ahvanooey, Qianmu Li, Mahdi Rabbani, Ahmed Raza Rajput (2017). A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks. International Journal of Advanced Computer Science & Applications, 8(10), 30-45. https://europub.co.uk/articles/-A-260730