You are previewing Mobile Security and Privacy.
O'Reilly logo
Mobile Security and Privacy

Book Description

Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks.

Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security.

The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges.



  • Presents the most current and leading edge research on mobile security and privacy, featuring a panel of top experts in the field
  • Provides a strategic and international overview of the security issues surrounding mobile technologies
  • Covers key technical topics and provides readers with a complete understanding of the most current research findings along with future research directions and challenges
  • Enables practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding the implementation of mobile technology security and privacy initiatives

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Contributors
  6. About the Editors
  7. Chapter 1: Mobile Security and Privacy
    1. Abstract
    2. 1 Introduction
    3. 2 Threats to Mobile Security
    4. 3 Organization of the Book
  8. Chapter 2: Mobile Security: A Practitioner’s Perspective
    1. Abstract
    2. Acknowledgments
    3. 1 Mobile Security
    4. 2 Principles
    5. 3 Application Stores
    6. 4 Approved Applications
    7. 5 Identity Management Issues
    8. 6 Privacy
    9. 7 Vulnerabilities
    10. 8 Threats
    11. 9 Risks
    12. 10 Mobile Security Strategy for Organizations that Develop Mobile Applications
    13. 11 Mitigations
    14. 12 Mobile Security Technical Controls
    15. 13 Forensics
    16. 14 Summary
    17. 15 Mobile Device Security Resources
    18. Glossary
    19. About the Authors
  9. Chapter 3: Mobile Security: End Users are the Weakest Link in the System
    1. Abstract
    2. 1 Definition: Security “Internetwork”
    3. 2 Growth of Smartphone Breaches
    4. 3 Organization Internetwork Security
    5. 4 Individual Internet Security
    6. 5 Conclusion
  10. Chapter 4: How Cyber-Savvy are Older Mobile Device Users?
    1. Abstract
    2. Acknowledgments
    3. 1 Introduction
    4. 2 Survey Design
    5. 3 Findings and Discussion
    6. 4 A Situational Crime Prevention Approach
    7. 5 Conclusion
  11. Chapter 5: The Role of Mobile Devices in Enhancing the Policing System to Improve Efficiency and Effectiveness: A Practitioner’s Perspective
    1. Abstract
    2. 1 Introduction
    3. 2 Interactive Constable on Patrol System
    4. 3 Capabilities
    5. 4 Conclusion
  12. Chapter 6: Supervised Learning Based Detection of Malware on Android
    1. Abstract
    2. Acknowledgments
    3. 1 Permission Background
    4. 2 Malware Landscape
    5. 3 Machine Learning
    6. 4 Characterization and Detection With the Consideration of User Security Specifications
    7. 5 Implementation
    8. 6 Evaluation and Discussion
    9. 7 Conclusion and Perspectives
    10. Appendix A Different Combinations of Permissions and Determination of Risks
    11. Appendix B Normal Applications for Testing
  13. Chapter 7: On Discovering Vulnerabilities in Android Applications
    1. Abstract
    2. 1 Introduction
    3. 2 Background
    4. 3 Modeling Common Vulnerabilities
    5. 4 Discovering Vulnerabilities
    6. 5 Discussion
    7. 6 Summary
    8. About the Authors
  14. Chapter 8: A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps
    1. Abstract
    2. 1 Introduction
    3. 2 An Overview of Android
    4. 3 Experiment Setup
    5. 4 Findings
    6. 5 Conclusion and Future Work
    7. Conflict of Interest Declaration
  15. Chapter 9: Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone
    1. Abstract
    2. Acknowledgments
    3. 1 Introduction
    4. 2 Related Work
    5. 3 Digital Evidence in Shanzhai Phone
    6. 4 Timeline Analysis of the Digital Evidence
    7. 5 Conclusion
  16. Chapter 10: RESTful IoT Authentication Protocols
    1. Abstract
    2. 1 Introduction
    3. 2 REST Foundations
    4. 3 RESTful IoT Protocols
    5. 4 Security for RESTful IoT Protocols
    6. 5 REST Message Authentication
    7. 6 RESTful IoT Message Authentication
    8. 7 Conclusion and Outlook
  17. Chapter 11: An Introduction to Various Privacy Models
    1. Abstract
    2. 1 Introduction
    3. 2 Definition of <span xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" class="italic">k</span>-Anonymity-Anonymity
    4. 3 Mechanisms That Support <span xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" class="italic">k</span>-Anonymity-Anonymity
    5. 4 Differential Privacy
    6. 5 Laplace Mechanism to Achieve Differential Privacy
    7. 6 Conclusion
    8. About the Authors
  18. Chapter 12: Performance of Digital Signature Schemes on Mobile Devices
    1. Abstract
    2. Acknowledgments
    3. 1 Introduction
    4. 2 Related Work
    5. 3 The Experiment
    6. 4 Conclusion
    7. About the Authors
  19. Index