Application Security for Mobile Devices

Author(s):  
Gabriele Costa ◽  
Aliaksandr Lazouski ◽  
Fabio Martinelli ◽  
Paolo Mori

In these last years, mobile devices, such as mobile phones and tablets, have become very popular. Moreover, mobile devices have become very powerful and commonly run fairly complex applications such as 3D games, Internet browsers, e-mail clients, social network clients, and many others. Hence, an adequate security support is required on these devices to avoid malicious application damage or unauthorized accesses to personal data (such as personal contacts or business email). This chapter describes the security support of the current commercial mobile devices along with a set of approaches that have been proposed in the scientific literature to enhance the security of mobile applications.

2015 ◽  
pp. 525-550
Author(s):  
Gabriele Costa ◽  
Aliaksandr Lazouski ◽  
Fabio Martinelli ◽  
Paolo Mori

In these last years, mobile devices, such as mobile phones and tablets, have become very popular. Moreover, mobile devices have become very powerful and commonly run fairly complex applications such as 3D games, Internet browsers, e-mail clients, social network clients, and many others. Hence, an adequate security support is required on these devices to avoid malicious application damage or unauthorized accesses to personal data (such as personal contacts or business email). This chapter describes the security support of the current commercial mobile devices along with a set of approaches that have been proposed in the scientific literature to enhance the security of mobile applications.


Author(s):  
Gabriele Costa ◽  
Aliaksandr Lazouski ◽  
Fabio Martinelli ◽  
Paolo Mori

In these last years, mobile devices, such as mobile phones or Personal Digital Assistants, became very popular among people. Moreover, mobile devices became also very powerful, and most of them are also able to execute applications, such as games, Internet browsers, e-mail clients, and so on. Hence, an adequate security support is required on these devices, to avoid that malicious applications damage the device or perform unauthorized accesses to personal data (such as the contact list). This chapter describes the approaches that have been proposed in scientific literature to guarantee the security of mobile devices.


2009 ◽  
pp. 870-880
Author(s):  
Yip Yee Shing ◽  
Chan Lit Tin ◽  
Shiu Ka Wai ◽  
Indranil Bose ◽  
Wang Ping ◽  
...  

Owing to the rapid development of mobile technology over the past few decades, there have been many different kinds of mobile devices emerging in the market, and most of them work with databases seamlessly. Mobile phone gaming, downloading of ringtones, and e-calendaring are some of the prominent examples of mobile applications that require the close integration of mobile devices with databases. Mobile devices take various forms and configurations. The packaging, form factors, hardware platforms, operating system support, and functional capabilities vary across these devices. There are, however, many common attributes shared by the devices, such as notebook computers, pen-based computers, handheld computers, and the like, all of which are used in mobile computing. These devices can be categorized into the following categories according to their functionalities and features, as detailed in Dhawan (1997). They are: • notebook computers • personal digital assistants • tablet computers • hybrid mobile devices • mobile phones In this article, we focus on personal digital assistants (PDA) and mobile phones as they are the most popular and commonly used mobile devices in the industry.


2022 ◽  
Vol 2022 ◽  
pp. 1-7
Author(s):  
Ashwag Albakri ◽  
Huda Fatima ◽  
Maram Mohammed ◽  
Aisha Ahmed ◽  
Aisha Ali ◽  
...  

With the presence of the Internet and the frequent use of mobile devices to send several transactions that involve personal and sensitive information, it becomes of great importance to consider the security aspects of mobile devices. And with the increasing use of mobile applications that are utilized for several purposes such as healthcare or banking, those applications have become an easy and attractive target for attackers who want to get access to mobile devices and obtain users’ sensitive information. Developing a secure application is very important; otherwise, attackers can easily exploit vulnerabilities in mobile applications which lead to serious security issues such as information leakage or injecting applications with malicious programs to access user data. In this paper, we survey the literature on application security on mobile devices, specifically mobile devices running on the Android platform, and exhibit security threats in the Android system. In addition, we study many reverse-engineering tools that are utilized to exploit vulnerabilities in applications. We demonstrate several reverse-engineering tools in terms of methodology, security holes that can be exploited, and how to use these tools to help in developing more secure applications.


De Musica ◽  
2021 ◽  
Author(s):  
Madeleine Le Bouteiller

Mobile phones and the Internet combined have led to the creation of applications that allow their users to perform music using only their Smartphones. With the Smule applications that we analyze in this paper, people can sing karaoke together with other singers from all over the world, or play a tune with their fingertips tapping on a phone’s screen. Besides providing new entertainment activities, the Smule applications and their multiple options regarding audio and video editing can bring about new musical practices and musical artifacts. Smule users can sing duets remotely, without actually singing on the same time – a virtual collective performance. Singing karaoke becomes a solitary practice where togetherness is contrived but not achieved. Video recordings can be edited and shared on a built-in social network, thus being endorsed with a new function: to create bonds within a social network. Analyzing the discourses of Smule creators and developers, we also show that the applications do not achieve what they are promised to do, namely providing social and authentic practices. 


Author(s):  
Chara Papoutsi ◽  
Athanasios Drigas

<strong>Mobile devices, such as mobile phones and personal digital assistants, have gained wide-spread popularity and are part of the everyday life of billions of people. Today’s mobile phones represent a rich and powerful computing platform, given their sensing, processing, social and communication capabilities. Empathy is the ability to identify with and understand another person’s situation and feelings. Our ability to empathize affects how well we communicate our thoughts and feelings with others, how well we understand others, and how comfortable people feel communicating with us. Mobile devices have made a huge step in trying to cultivate empathy to people and different social groups through interesting applications.</strong>


2009 ◽  
pp. 144-151
Author(s):  
Mark van ‘t Hooft ◽  
Graham Brown-Martin ◽  
Karen Swan

In a world that is increasingly mobile and connected, the nature of information resources is changing. The new information is networked, unlimited, fluid, multimodal, and overwhelming in quantity. Digital technologies, such as mobile phones, wireless handheld devices, and the Internet, provide access to a wide range of resources and tools, anywhere and anytime. This type of access and connectivity has also had an impact on how we collaborate on projects and share media and therefore, greatly increases opportunities to learn inside and outside institutionalized school systems. Learners now have the tools to take learning beyond classrooms and the school day. The development of handheld devices can be traced back to Alan Kay’s vision of the Dynabook. As early as the 1970s, Kay envisioned a mobile, kid-friendly, notebook-sized computer with arti- ficial-intelligence capabilities that would support children’s learning inside and outside of school. Similar ideas soon followed in the form of devices such as the Psion I (1984), the GRiDPaD (1988), Amstrad’s PenPad, and Tandy’s Zoomer (1993), the Apple Newton (1993-1995), and the eMate (1997-1998). During the 1990s and early 2000s, Palm developed a series of handheld devices that defined the handheld market in North America, while Microsoft developed several versions of its Windows Mobile software that could be found on mobile devices made by such companies as HP, Dell, and more recently, Fujitsu Siemens (Bayus, Jain, & Rao, 1997; HPC Factor, 2004; Williams, 2004). There are also many devices whose primary function is entertainment or communication, including media players such as Apple iPods, portable gaming devices like the Sony PSP and the Nintendo DS, and, of course, mobile phones. These types of devices are becoming increasingly popular and multifunctional, with iPods being able to store and play music, pictures, and video; portable gaming devices sporting wireless capabilities for interaction between devices (and in the case of the PSP, Internet access); and mobile phones being used to shoot pictures and video, upload content to the Web or e-mail it elsewhere, do text messaging, and make phone calls. Whatever the device, convergence seems to be increasingly important, and growing numbers of young people are using these mobile, digital, and connected tools daily, whenever and wherever they need them, and this includes schools.


2020 ◽  
Vol 12 (1) ◽  
pp. 62-66
Author(s):  
Hanun Asrohah ◽  
Milad Khusnu ◽  
Wibowo Teguh ◽  
Rhofita Ika

This research discussed the use of SPA-based mobile applications for academic activities at universities. This technology works using asynchronous JavaScript, which can be run by mobile devices and is not limited by the operating system used by mobile phones such as Android, iOS, and others. This way could be reduced the workload of the server because the data sent by a server is not significant compared with a web-based application.


2014 ◽  
Vol 35 (3) ◽  
pp. 158-165 ◽  
Author(s):  
Christian Montag ◽  
Konrad Błaszkiewicz ◽  
Bernd Lachmann ◽  
Ionut Andone ◽  
Rayna Sariyska ◽  
...  

In the present study we link self-report-data on personality to behavior recorded on the mobile phone. This new approach from Psychoinformatics collects data from humans in everyday life. It demonstrates the fruitful collaboration between psychology and computer science, combining Big Data with psychological variables. Given the large number of variables, which can be tracked on a smartphone, the present study focuses on the traditional features of mobile phones – namely incoming and outgoing calls and SMS. We observed N = 49 participants with respect to the telephone/SMS usage via our custom developed mobile phone app for 5 weeks. Extraversion was positively associated with nearly all related telephone call variables. In particular, Extraverts directly reach out to their social network via voice calls.


Sign in / Sign up

Export Citation Format

Share Document