Mobile Apps Threats

Mobile Apps Threats

Donovan Peter Chan Wai Loon (University of Malaya, Malaysia) and Sameer Kumar (University of Malaya, Malaysia)
DOI: 10.4018/978-1-5225-7598-6.ch074
OnDemand PDF Download:
No Current Special Offers


From adults to children, beginners to experts, and in numerous countries around the world, there is a diverse user base for mobile devices. However, the extensive use of mobile devices has also led to the proliferation and attacks of various mobile malware. The purpose of this chapter is to provide an overview of mobile malware. Subsequently, the chapter highlights the current trends and challenges posed by malicious mobile applications. The authors look into Android and iOS mobile platforms and discuss current research to detect malicious applications. Remedies for poor risk communications on Android-based devices are also suggested.
Chapter Preview


Understanding Mobile Threats

In order to offer a wide indication of threats facing mobile devices, it is first important to understand the objectives, reasons and distribution techniques of potential attacks. In this paper, we adapted a threat model from prior research by Delac, Silic, & Krolo (2011 p. 2-3) and divided into two main components: attack goals and attack paths. This is model is further supported by a similar study in the same year by Leavit (2011 p. 11-13) and has similar descriptions of the main components.

Complete Chapter List

Search this Book: