When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments

Jon Oberheide, F. Jahanian
{"title":"When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments","authors":"Jon Oberheide, F. Jahanian","doi":"10.1145/1734583.1734595","DOIUrl":null,"url":null,"abstract":"Sophisticated consumer mobile devices continue to approach the capabilities and extensibility of traditional computing environments. Unfortunately, these new capabilities and applications make mobile devices an enticing target for attackers and malicious software. Due to such threats, the domain of mobile security has been getting a considerable amount of attention. However, current approaches have failed to consider key differences and their practical impact on the security of modern platforms when adopting techniques from non-mobile (or \"fixed\") environments. To help demystify mobile security and guide future research, we examine the unique challenges of mobile environments ranging from hardware to software to usability, delve in the diverse security models of current mobile platforms, and present our five commandments of mobile security research.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"26 1","pages":"43-48"},"PeriodicalIF":0.0000,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"99","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1734583.1734595","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 99

Abstract

Sophisticated consumer mobile devices continue to approach the capabilities and extensibility of traditional computing environments. Unfortunately, these new capabilities and applications make mobile devices an enticing target for attackers and malicious software. Due to such threats, the domain of mobile security has been getting a considerable amount of attention. However, current approaches have failed to consider key differences and their practical impact on the security of modern platforms when adopting techniques from non-mobile (or "fixed") environments. To help demystify mobile security and guide future research, we examine the unique challenges of mobile environments ranging from hardware to software to usability, delve in the diverse security models of current mobile platforms, and present our five commandments of mobile security research.
当移动比固定更难时(反之亦然):揭开移动环境中的安全挑战的神秘面纱
复杂的消费者移动设备继续接近传统计算环境的功能和可扩展性。不幸的是,这些新功能和应用程序使移动设备成为攻击者和恶意软件的诱人目标。由于这些威胁,移动安全领域已经得到了相当多的关注。然而,当采用来自非移动(或“固定”)环境的技术时,当前的方法未能考虑关键差异及其对现代平台安全性的实际影响。为了帮助揭开移动安全的神秘面纱并指导未来的研究,我们研究了移动环境的独特挑战,从硬件到软件再到可用性,深入研究了当前移动平台的各种安全模型,并提出了移动安全研究的五大戒律。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信