An Extensive Survey on Mobile Security and Issues

International Journal of Computer & Organization Trends (IJCOT)          
© 2012 by IJCOT Journal
Volume-2 Issue-1                           
Year of Publication : 2012
Authors : R.Surendiran , Dr.K.Alagarsamy


R.Surendiran , Dr.K.Alagarsamy.  "An Extensive Survey on Mobile Security and Issues" . International Journal of Computer & organization Trends (IJCOT), V2(1):39-46 Jan - Feb 2012, ISSN: 2249-2593, Published by Seventh Sense Research Group.

Abstract—As wireless communication has been rapidly developed, mobile applications, services are growing much and more popular, like instant messaging, downloading of a variety of contents, mobile commerce, mobile banking, Internet access, etc. Technology advancement has simplified business, enriched the entertainment and made personal transactions more convenient for mobile device customers. Mobile devices such as cellular phone, PDA and smart phone are opened the door to a lot of security threats like malicious code, vulnerabilities of mobile phone, attacks on communication, data robbery and damage, intruders, hackers, virus, spam, eves drooping, tracing, Jung mails, etc. information security will become a critical issue to mobile devices and be of great concern to mobile devices users, just like what computer users do today. This paper wills analysis the various mobile threats and security issues.


[1] A-D Schmidt and S.Albayrak, "Malicious Software for Smartphone," TechnischeUniversitat Berlin - DAI - Labor, Tech. Rep. TUB-DAI 02/08-01, February 2008,
[2] N.Leavitt, "Mobile Phone: The Next Frontier for Hackers?" Computer, vol. 38, pp. 20-23, April 2005.
[3].M. Hypponen, “Malware Goes Mobile,” Scientific American, vol. 295,no. 5, pp. 46–53, 2006.
[4] M. Hypponen, “Mobile Security Review September 2010,” F-Secure Labs, Helsinki Finland, Tech. Rep., September 2010.
[5]. G. Lawton, “Is It Finally Time to Worry about Mobile Malware?”Computer, vol. 41, pp. 12–14, May 2008.
[6] S.Toyssy and M.Helenius, "About malicious software in smartphones," journal in computer Virology, vol. 2, no 2, pp. 109-119.2006.
[7] “Bluetooth-Worm:SymbOS/Cabir,” Jun 2004. [Online].Available: cabir.shtml
[8] F-Secure, “Liberty (Palm),” Aug 2000. [Online]. Available: http: // palm.shtml.
[10] A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner,“Survey of Mobile Malware in the Wild,” 2011. [Online]. Available:∼afelt/malware.html.
[11] TiwariMohini, SrivastavaAshish Kumar and Gupta Nitesh Review on Android and Smartphone Security. Research Journal of Computer and Information Technology Sciences.
[13] Mariantonietta La Polla, Fabio Martinelli, and Daniele Sgandurra, A Survey on Security for Mobile Devices, Ieee Communications Surveys & Tutorials, Vol. 15, No. 1, First Quarter 2013.
[14] Android Open Source Project. Android Security Overview. (2013) .
[15].A. Gostev, “Mobile malware evolution: An overview,” KasperskyLabs Report on Mobile Viruses, 2006.
[16] Kaur S. and Kaur M., Review Paper on Implementing Security on Android Application, Journal of Environmental Sciences, Computer Science and Engineering & Technology, 2(3), (2013)
[17] J. Bickford, R. O’Hare, A. Baliga, V. Ganapathy, and L.Iftode,“Rootkits on smart phones: attacks, implications and opportunities, “in Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, ser. HotMobile ’10. New York, NY,USA: ACM, 2010, pp. 49–54.
[18] C. Papathanasiou and N. J. Percoco, “This is not the droid you’relooking for...” in DEFCON 18, July 2010.
[19] McAfee Labs, “Mobile Security Report 2009,” 2009.[Online]. Available: http://www.mcafee. com/us/resources/reports/rp-mobile-security-2009.pdf
[20] Kasperksy Lab, “Popular Porn Sites Distribute a New TrojanTargeting Android Smartphones,” 2010. [Online].Available:
[21] D. Damopoulos, G. Kambourakis, and S. Gritzalis, “iSAM: AniPhone Stealth Airborne Malware,” in Future Challenges in Securityand Privacy for Academia and Industry, ser. IFIP Advances in Information and Communication Technology, J.Camenisch, S.FischerHubner, Y.Murayama, A.Portmann, and C. Rieder, Eds. Springer Boston, 2011 vol. 354, ch. 2, pp. 17-28.

Keywords— smart phone, malicious code, intruders, hackers, virus, spam.