Chapter
Chapter 2: Mobile Security: A Practitioner’s Perspective
1.1 Global Growth in Mobile Use
4.2 Software Watermarking
4.2.1 Online-Based Services (Accessible Via Mobile)
5 Identity Management Issues
8.1 Application-Based Threats
8.1.2 Electronic Tracking (Spyware or Adware)
8.1.3 Vulnerable Applications
8.2 Internet-Based Threats
8.2.1 Denial of Service (DoS)/Distributed Denial of Service (DDoS) Threats
8.2.3 Advanced Persistent Threats (APTs)
8.3.2 Electronic Eavesdropping Such as Wi-Fi Sniffing and Bluetooth/Bluejacking
8.3.4 Hotel or Conference Facility Networks
8.4.1 Stolen Data Due to Loss, Theft, or Disposal of Devices
8.4.2 Unauthorized Access
8.6 Unintentional Disclosure of Data Threats
10 Mobile Security Strategy for Organizations that Develop Mobile Applications
10.2 Basic Device Management
10.3 Secure Software Development Life Cycles (SDLC)
10.4.1 Developer Training
10.4.2 Session Management
10.4.4 Data Confidentiality
10.4.5 Environmental and Biometric Sensors
10.4.6 App Penetration Testing
10.4.7 Handle Identity Management
10.4.8 Bring Your Own Device (BYOD)
10.4.9 Mobile Device Management
10.4.10 Mobile Application Management
12 Mobile Security Technical Controls
12.1 Passwords, Passphrases, and Biometrics
User-supplied PIN/Passphrase
12.5 Jailbreaking and Rooting
12.8 Mobile Device Management
12.8.2 Device Eligibility
12.8.3 Device Registration/User Enrolment
12.8.6 BYOD vs. Choose Your Own Device (CYOD)
12.8.7 Remote Wiping BYOD Devices
12.9 Mobile Application Management
12.10 Remote Track and Wipe
12.11 Antivirus/Antimalware
12.12 Transmission Security
12.13 Mobile Usage Controls
12.13.2 Content Filtering
12.13.3 Location and Monitoring Settings
12.15 Cross-Border Data Theft
12.16 Regulatory Retention
15 Mobile Device Security Resources
Chapter 3: Mobile Security: End Users are the Weakest Link in the System
1 Definition: Security “Internetwork”
2 Growth of Smartphone Breaches
3 Organization Internetwork Security
4 Individual Internet Security
Chapter 4: How Cyber-Savvy are Older Mobile Device Users?
3 Findings and Discussion
4 A Situational Crime Prevention Approach
Chapter 5: The Role of Mobile Devices in Enhancing the Policing System to Improve Efficiency and Effectiveness: A Practiti ...
2 Interactive Constable on Patrol System
3.1 Information Management and Knowledge Exchange
3.2 Intelligent Personal Assistant—Bobby
3.5 Situational Awareness
Chapter 6: Supervised Learning Based Detection of Malware on Android
1.1 Limitations of Permission Model
2.2 Tools for Malware Detection
2.2.2 Intrusion Detection Systems
3.1.2 Attributes and Classes
3.1.3 The Classification Model
3.1.4 Performance of Classification Models
3.1.5 Performance Evaluation of a Classifier
3.2 Related Works: Machine Learning and Permissions
3.2.1 Permission Analysis
3.2.2 Individual Permissions
3.2.3 Combinations of Permissions
3.2.4 Machine Learning Techniques
4 Characterization and Detection With the Consideration of User Security Specifications
4.1.1 Applications for Learning Detection
4.1.2 Applications for System Validation
4.2.2 Determination of Discriminating Metrics
4.2.3 Translation Into Vector Space
4.3.1 Risk and Category Definitions
4.3.2 Translation Into Vector Space
6 Evaluation and Discussion
6.1 Detection Performance
6.2 Comparison Between Layer Models
6.3 Detection of Malware Families
7 Conclusion and Perspectives
Appendix A Different Combinations of Permissions and Determination of Risks
Appendix B Normal Applications for Testing
Chapter 7: On Discovering Vulnerabilities in Android Applications
2.1 Security Mechanisms of Android
2.2 Taxonomy of Android App Vulnerability
3 Modeling Common Vulnerabilities
3.1 Insecure Data Storage
3.2 Insufficient Transport Layer Protection
3.3 Unintended Data Leakage
3.4 Poor Authorization and Authentication
3.6 Webview Vulnerability
3.7 App Communication Vulnerability
3.8 Configuration Error Vulnerability
4 Discovering Vulnerabilities
4.1 Static Analysis-Based Approaches
4.2 Dynamic Analysis-Based Approaches
5.1 Limitations in Static Analysis-Based Methods
5.2 Limitations in Dynamic Analysis-Based Methods
Chapter 8: A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps
2.1.1 System Framework and Architecture
2.1.2 Security Architecture
2.1.4 Rooted Android Devices
2.2 Android Application Security
2.2.2 Component Permissions
2.3 Android Malware Threats and Countermeasures
2.3.3 Intrusion Detection System
2.3.5 Selective Access Control
2.3.6 Context-Aware Security
5 Conclusion and Future Work
Conflict of Interest Declaration
Chapter 9: Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone
3 Digital Evidence in Shanzhai Phone
3.1 Physical Data Storage and Logical File System
3.2 Extracting Baseline Contents From Flash Dump of Shanzhai Phone
4 Timeline Analysis of the Digital Evidence
4.1 Deleted Contents and “Snapshots” in the Flash Dump
4.2 Timeline Analysis on Phonebook
Chapter 10: RESTful IoT Authentication Protocols
4 Security for RESTful IoT Protocols
5 REST Message Authentication
5.1 REST Message Signature
5.2 REST Message Verification
6 RESTful IoT Message Authentication
6.1 RESTful CoAP Message Authentication (RECMA)
6.2 RESTful RACS Message Authentication (RERMA)
Chapter 11: An Introduction to Various Privacy Models
2 Definition of k -Anonymity
3 Mechanisms That Support k -Anonymity
4.2 Definition of Differential Privacy
5 Laplace Mechanism to Achieve Differential Privacy
Chapter 12: Performance of Digital Signature Schemes on Mobile Devices
3.1 Cryptographic Settings
3.3 Experiment Results and Observations