Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform Page: 1
xi, 149 pages : illustrations (chiefly color)View a full description of this dissertation.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
CHAPTER 1
INTRODUCTION
1.1. Introduction and Background
Would you ever give a briefcase which contained all your health records, address, social
security number, all your contacts, your bank information, a transcript of every conversation you
have ever written or said, personal photos and videos, and a list of every place you have ever
been... to a complete stranger wearing a hoodie and sunglasses?
No?
Well, any smartphone contains all the information that was in that briefcase, and more. In
essence, a breach of any smartphone is damaging to the owner, and even worse, it is an especially
rewarding "lock" to pick for people who want to use that information to gain an unfair advantage.
Based on the available attacks and malware nowadays, phones are also a relatively easy thing to
attack. Therefore, protecting a phone is of utmost importance for any individual.
The goal of this dissertation is to address some of the many security vulnerabilities on the
mobile platform with the idea of Intention of the agent. These vulnerabilities come in different
forms (see Figure 1.1), including:
* Malware on any open app market/store
* Malicious users called trolls
* Eavesdropping
* Illegitimate authentication
1.2. Motivation
As of April 2014, there are 143 million smartphones being used in the U.S. [79]. That is,
by January 2014, 90% of American adults owned a cell phone, 58% owned a smartphone. With
The content in this chapter is reproduced from Mohamed Fazeen and Ram Dantu, "Another free app: Does it have the
right intentions?", Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on, July 2014,
pp. 282289, with permission from IEEE.1
Upcoming Pages
Here’s what’s next.
Search Inside
This dissertation can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Dissertation.
Mohamed Issadeen, Mohamed Fazeen. Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform, dissertation, December 2014; Denton, Texas. (https://digital.library.unt.edu/ark:/67531/metadc700067/m1/15/: accessed July 18, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; .