Mobile security | notes

Notes

  1. ^ "BYOD and Increased Malware Threats Help Driving Billion Dollar Mobile Security Services Market in 2013". ABI Research. 2013-03-29. Retrieved 2018-11-11.
  2. ^ a b Bishop 2004.
  3. ^ a b c d e f Leavitt, Neal (2011). "Mobile Security: Finally a Serious Problem?". Computer. 44 (6): 11–14. 10.1109/MC.2011.184.
  4. ^ Olson, Parmy. "Your smartphone is hackers' next big target". CNN. Retrieved August 26, 2013.
  5. ^ "Guide on Protection Against Hacking" (PDF). Mauritius National Computer Board. Archived from the original (PDF) on 2012-11-17.
  6. ^ Lemos, Robert. "New laws make hacking a black-and-white choice". CNET News.com. Retrieved September 23, 2002.
  7. ^ McCaney, Kevin. "'Unknowns' hack NASA, Air Force, saying 'We're here to help'". Retrieved May 7, 2012.
  8. ^ Bilton 2010.
  9. ^ a b c d e Guo, Wang & Zhu 2004, p. 3.
  10. ^ Dagon, Martin & Starder 2004, p. 12.
  11. ^ a b Dixon & Mishra 2010, p. 3.
  12. ^ a b c d e f g h Töyssy & Helenius 2006, p. 113.
  13. ^ Siemens 2010, p. 1.
  14. ^ Gendrullis 2008, p. 266.
  15. ^ European Telecommunications Standards Institute 2011, p. 1.
  16. ^ Jøsang, Miralabé & Dallot 2015.
  17. ^ Roth, Polak & Rieffel 2008, p. 220.
  18. ^ Gittleson, Kim (28 March 2014) Data-stealing Snoopy drone unveiled at Black Hat BBC News, Technology, Retrieved 29 March 2014
  19. ^ Wilkinson, Glenn (25 September 2012) Snoopy: A distributed tracking and profiling framework Archived 2014-04-06 at the Wayback Machine Sensepost, Retrieved 29 March 2014
  20. ^ a b Töyssy & Helenius 2006, p. 27.
  21. ^ Mulliner 2006, p. 113.
  22. ^ Dunham, Abu Nimeh & Becher 2008, p. 225.
  23. ^ a b Becher 2009, p. 65.
  24. ^ Becher 2009, p. 66.
  25. ^ a b Kasmi C, Lopes Esteves J (13 August 2015). "IEMI Threats for Information Security: Remote Command Injection on Modern Smartphones". IEEE Transactions on Electromagnetic Compatibility. 57 (6): 1752–1755. Lay summaryWIRED (14 October 2015).closed access
  26. ^ Michael SW Lee; Ian Soon (2017-06-13). "Taking a bite out of Apple: Jailbreaking and the confluence of brand loyalty, consumer resistance and the co-creation of value". Journal of Product & Brand Management. 26 (4): 351–364. 10.1108/JPBM-11-2015-1045. 1061-0421.
  27. ^ a b Aviv, Adam J.; Gibson, Katherine; Mossop, Evan; Blaze, Matt; Smith, Jonathan M. Smudge Attacks on Smartphone Touch Screens (PDF). 4th USENIX Workshop on Offensive Technologies.
  28. ^ http://images.mktgassets.symantec.com/Web/Symantec/%7B3a70beb8-c55d-4516-98ed-1d0818a42661%7D_ISTR23_Main-FINAL-APR10.pdf?aid=elq_
  29. ^ a b c Schmidt et al. 2009a, p. 3.
  30. ^ Suarez-Tangil, Guillermo; Juan E. Tapiador; Pedro Peris-Lopez; Arturo Ribagorda (2014). "Evolution, Detection and Analysis of Malware in Smart Devices" (PDF). IEEE Communications Surveys & Tutorials. 16 (2): 961–987. 10.1109/SURV.2013.101613.00077.
  31. ^ Becher 2009, p. 87.
  32. ^ Becher 2009, p. 88.
  33. ^ Mickens & Noble 2005, p. 1.
  34. ^ Raboin 2009, p. 272.
  35. ^ Töyssy & Helenius 2006, p. 114.
  36. ^ Haas, Peter D. (2015-01-01). "Ransomware goes mobile: An analysis of the threats posed by emerging methods". UTICA COLLEGE. Cite journal requires |journal= (help)
  37. ^ Hamilton, Keegan (July 11, 2018). "El Chapo's lawyers want to suppress evidence from spyware used to catch cheating spouses". Vice Media. The Thailand-based FlexiSPY bills itself as “the world's most powerful monitoring software,” and the company’s website lists prospective buyers as concerned parents who want to spy on their kids and companies interested in snooping on their employees. But the app has also been dubbed “stalkerware” because it was initially marketed to jealous spouses paranoid about infidelity.
  38. ^ Becher 2009, p. 91-94.
  39. ^ a b c d e Becher 2009, p. 12.
  40. ^ a b Schmidt, Schmidt & Clausen 2008, p. 5-6.
  41. ^ Halbronn & Sigwald 2010, p. 5-6.
  42. ^ Ruff 2011, p. 127.
  43. ^ Hogben & Dekker 2010, p. 50.
  44. ^ Schmidt, Schmidt & Clausen 2008, p. 50.
  45. ^ a b c Shabtai et al. 2009, p. 10.
  46. ^ Becher 2009, p. 31.
  47. ^ Schmidt, Schmidt & Clausen 2008, p. 3.
  48. ^ Shabtai et al. 2009, p. 7-8.
  49. ^ Pandya 2008, p. 15.
  50. ^ Becher 2009, p. 22.
  51. ^ Becher et al. 2011, p. 96.
  52. ^ Becher 2009, p. 128.
  53. ^ Becher 2009, p. 140.
  54. ^ Thirumathyam & Derawi 2010, p. 1.
  55. ^ Schmidt, Schmidt & Clausen 2008, p. 7-12.
  56. ^ Becher 2009, p. 126.
  57. ^ Malik 2016, p. 28.
  58. ^ Becher et al. 2011, p. 101.
  59. ^ a b Ruff 2011, p. 11.
  60. ^ a b Hogben & Dekker 2010, p. 45.
  61. ^ a b Becher 2009, p. 13.
  62. ^ Becher 2009, p. 34.
  63. ^ Ruff 2011, p. 7.
  64. ^ Mylonas, Alexios; Kastania, Anastasia; Gritzalis, Dimitris (2013). "Delegate the smartphone user? Security awareness in smartphone platforms". Computers & Security. 34: 47–66. CiteSeerX CiteSeerX 10.1.1.717.4352. 10.1016/j.cose.2012.11.004.
  65. ^ Hogben & Dekker 2010, p. 46-48.
  66. ^ Ruff 2011, p. 7-8.
  67. ^ Shabtai et al. 2009, p. 8-9.
  68. ^ Hogben & Dekker 2010, p. 43.
  69. ^ Hogben & Dekker 2010, p. 47.
  70. ^ a b "Security Tips for Protecting Your Latest Android Smartphone - Lava Blog". www.lavamobiles.com. Retrieved 2017-09-22.
  71. ^ Hogben & Dekker 2010, p. 43-45.
  72. ^ Charlie Sorrel (2010-03-01). "TigerText Deletes Text Messages From Receiver's Phone". the original on 2010-10-17. Retrieved 2010-03-02.
  73. ^ Becher 2009, p. 40.
  74. ^ Gupta 2016, p. 461.