Delegate the Smartphone User? Security Awareness in Smartphone Platforms

Smartphone users increasingly download and install third-party applications from official application repositories. Attackers may use this centralized application delivery architecture as a security and privacy attack vector. This risk increases since application vetting mechanisms are often not in place and the user is delegated to authorize which functionality and protected resources are accessible by third-party applications. In this paper, the authors mount a survey to explore the security awareness of Smartphone users who download applications from official application repositories (e.g. Google Play, Apple's App Store, etc.).

Provided by: Athens University of Economics and Business Topic: Security Date Added: Nov 2012 Format: PDF

Find By Topic