Conference PaperPDF Available

Security monitoring for mobile device assets: a survey

Authors:

Abstract and Figures

Organizations are often faced with the need to manage large numbers of mobile device assets, including tight control over aspects such as usage profiles, customization, applications and security. Moreover, the raise of the Bring Your Own Device (BYOD) paradigm has further contributed to hamper these requirements, making it difficult to strike a balance between corporate regulations and freedom of usage. In this scope, security is one of the main requirements both for individual and corporate usage. Device and information protection on mobile ecosystems is quite different from securing other assets such as laptops or desktops, due to specific characteristics and restrictions. For instance, the resource consumption overhead of security mechanisms, which is less relevant for desktop/laptop environments, is critical for mobile devices which frequently have less computing power and must keep power consumption as low as possible. Security mechanisms for mobile devices combine preventive tools (e.g. Trusted Execution Environments and sandboxed applications), monitoring solutions and reactive and mitigation techniques. In this paper we discuss these security solutions, presenting a survey on the technologies, frameworks and use cases for mobile device security monitoring and management, with an emphasis on the associated open challenges and benefits, from both the end-user and the corporate points-of-view.
Content may be subject to copyright.
! !
!"#$%&'()*+%),+-&.")/"0&#")122"'23)1)!$%0"()
"#$%#&'!(&)*+,!-./#'!0'/1*2,!3&*4'!5./6+,!7*/8'!0&)9:1+!
+;:<*.$):#$!'=!>#='.)*$&?1!@#4&#::.&#4!'=!$A:!B#&C:.1&$D!'=!5'&)E.*,!5'&)E.*,!7'.$/4*8!
2F#:0'/.?:,!5'#1/8$'.&*!>#='.)G$&?*!(H*I!
*?8&)*J1$/H:#$IH:&I/?I<$!
E)1'/1*J'#:1'/.?:I<$!
$K?./6JH:&I/?I<$!
<1&)':1JH:&I/?I<$!
!
1-2'%4#'3!F.4*#&6*$&'#1! *.:! '=$:#! =*?:H! L&$A! $A:! #::H! $'! )*#*4:! 8*.4:! #/)E:.1! '=! )'E&8:! H:C&?:! *11:$1,!
&#?8/H&#4!$&4A$!?'#$.'8!'C:.!*1<:?$1!1/?A!*1!/1*4:!<.'=&8:1,!?/1$')&6*$&'#,!*<<8&?*$&'#1!*#H!1:?/.&$DI!M'.:'C:.,!
$A:! .*&1:! '=! $A:! -.&#4! N'/.! FL#! ;:C&?:! O-NF;P! <*.*H&4)! A*1! =/.$A:.! ?'#$.&E/$:H! $'! A*)<:.! $A:1:!
.:Q/&.:):#$1,!)*R&#4!&$!H&==&?/8$!$'!1$.&R:!*!E*8*#?:!E:$L::#!?'.<'.*$:!.:4/8*$&'#1!*#H!=.::H')!'=!/1*4:I!
>#! $A&1! 1?'<:,! 1:?/.&$D! &1! '#:!'=! $A:! )*&#! .:Q/&.:):#$1! E'$A! ='.! &#H&C&H/*8! *#H! ?'.<'.*$:!/1*4:I!;:C&?:! *#H!
&#='.)*$&'#!<.'$:?$&'#! '#! )'E&8:! :?'1D1$:)1!&1!Q/&$:!H&==:.:#$!=.')!1:?/.&#4! '$A:.! *11:$1! 1/?A! *1! 8*<$'<1!'.!
H:1R$'<1,!H/:!$'!1<:?&=&?!?A*.*?$:.&1$&?1!*#H!.:1$.&?$&'#1I!S'.!&#1$*#?:,!$A:!.:1'/.?:! ?'#1/)<$&'#! 'C:.A:*H!'=!
1:?/.&$D! ):?A*#&1)1,! LA&?A! &1! 8:11! .:8:C*#$! ='.! H:1R$'<T8*<$'<! :#C&.'#):#$1,! &1! ?.&$&?*8! ='.! )'E&8:! H:C&?:1!
LA&?A!=.:Q/:#$8D!A*C:!8:11!?')</$&#4!<'L:.!*#H!)/1$!R::<!<'L:.!?'#1/)<$&'#!*1!8'L!*1!<'11&E8:I!
0:?/.&$D!):?A*#&1)1!='.! )'E&8:!H:C&?:1! ?')E&#:!<.:C:#$&C:!$''81! O:I4I! 3./1$:H! @U:?/$&'#! @#C&.'#):#$1! *#H!
1*#HE'U:H!*<<8&?*$&'#1P,!)'#&$'.&#4!1'8/$&'#1!*#H!.:*?$&C:!*#H!)&$&4*$&'#!$:?A#&Q/:1I!>#!$A&1!<*<:.!L:!H&1?/11!
$A:1:!1:?/.&$D!1'8/$&'#1,!<.:1:#$&#4!*!1/.C:D!'#!$A:!$:?A#'8'4&:1,!=.*):L'.R1!*#H!/1:!?*1:1!='.!)'E&8:!H:C&?:!
1:?/.&$D!)'#&$'.&#4!*#H!)*#*4:):#$,!L&$A!*#!:)<A*1&1!'#!$A:!*11'?&*$:H!'<:#!?A*88:#4:1!*#H!E:#:=&$1,!=.')!
E'$A!$A:!:#HV/1:.!*#H!$A:!?'.<'.*$:!<'&#$1V'=VC&:LI!
5"(6+%72W!)'E&8:!H:C&?:1,!1:?/.&$D,!)'#&$'.&#4,!)*#*4:):#$,!H:$:?$&'#,!<.:C:#$&'#!
89 :;'%+7$#'&+;)
B#8&R:!'$A:.!='.)1!'=!?')</$&#4!O1/?A!*1!H:1R$'<!'.!8*<$'<1!'.!?:.$*&#!1<:?&*8&6:H!:)E:HH:H!1D1$:)1P,!)'E&8:!
H:C&?:1! ?*#! E:! ?A*.*?$:.&6:H! ED! 1:C:.*8!1<:?&=&?! $.*&$1! 1/?A! *1! H&):#1&'#1! *#H! L:&4A$,! ?'##:?$&C&$D,! A/)*#V
)*?A&#:! &#$:.=*?:! ?*<*E&8&$&:1! '.! */$'#')DI! M'.:'C:.,! /1*4:! )'H:81! H&==:.! =.')! $.*H&$&'#*8! H:1R$'<!
?')</$&#4,!*1!&#$:.*?$&'#!$:#H1!$'!'??/.!'C:.!1A'.$!$&):!L&#H'L1,!.*$A:.!$A*#!&#!*!?'#$&#/'/1!)*##:.I!
!
M'1$!)'H:.#!)'E&8:!H:C&?:1!A*C:!*#!:)E:HH:H!H&1<8*D!1?.::#!O'.!?*#!E:!?'##:?$:H!$'!'#:P,!.:?:&C&#4!&#</$!
=.')!<AD1&?*8!'.!C&.$/*8!E/$$'#1!*#H!R:DE'*.H1! O/1&#4!$'/?AV1:#1&$&C:!H&1<8*D1!&#!$A:!8*$$:.!?*1:PI!"HH&$&'#*88D,!
1'):!H:C&?:1!*81'!1/<<'.$! */H&'! &#</$,! #*):8D! C'&?:! .:?'4#&$&'#I! 0:C:.*8! $D<:1! '=!1:#1'.1! *#H! H*$*! ?*<$/.:!
H:C&?:1! ?*#! *81'! E:! :)E:HH:H! '.! *$$*?A:H! $'! $A:! )'E&8:! H:C&?:I! 3D<&?*8! :U*)<8:1! &#? 8/H:! *??:8:.'):$:.1,!
?')<*11:1,! )*4#:$'):$:.1!*#H! 4D.'1?'<:1! O*88'L&#4! ='.! H:$:?$&'#! '=! '.&:#$*$&'#! *#H! )'$&'#P,! *1! L:88! *1!
E*.?'H:,! XS>;,! =&#4:.<.&#$! *#H! 1)*.$! ?*.H! .:*H:.1I! F#! $'<! '=! *88! $A:! *8.:*HD! ):#$&'#:H! :U$.*1,! $A:! )'1$!
<.')&#:#$8D!/1:H! =:*$/.:1!*.:!.:8*$:H! $'!?'##:?$&C&$D!*#H! /1/*88D!?')<.&1:!Y&VS&,!-8/:$''$A,! ZS5! OZ:*.!S&:8H!
5'))/#&?*$&'#1P!*#H![70!?*<*E&8&$&:1I!
!
3A:!=&.1$!)'E&8:!H:C&?:1!H&H#\$!A*C:!)/?A!$'!'==:.I!;:C&?:1!8&R:!$A:!>-M!0&)'#!O.:8:*1:H!&#!+]]^,!.:4*.H:H!*1!
$A:!=&.1$! 1)*.$<A'#:P!L:.:!C:.D!_H/)E`!ED!$'H*D\1!1$*#H*.H1,!A*C&#4!C:.D!8&)&$:H!:8:?$.'#&?1!*#H!<.'?:11&#4!
<'L:.I! S'.! $A:! 1*R:! '=! ?'#$:U$,! 3*E8:! +! ?')<*.:1! 1:C:.*8! .:<.:1:#$*$&C:! )'E&8:! H:C&?:!)'H:81!.:8:*1:H!
E:$L::#!+]]^!*#H!2a+bW!*#!&7A'#:!b,!*!0*)1/#4![*8*UD!0!+1$![:#:.*$&'#,!*#!&7A'#:!+1$![:#:.*$&'#!O?'))'#8D!
.:=:..:H!ED!)*#D!*1!'#:!'=!$A:!=&.1$!:U*)<8:1!'=!$A:!?/..:#$!1)*.$<A'#:!<*.*H&4)P!*#H!$A:!>-M!0&)'#I!
!
M'E&8:! H:C&?:1! O*#H,! <*.$&?/8*.8D,! 1)*.$<A'#:1P! A*C:! E::#! 4.*H/*88D! *?Q/&.&#4! ?')</$&#4,! ?'))/#&?*$&'#1!
*#H! 1:#1'.D! ?*<*E&8&$&:1! *$! *#! :U<'#:#$&*8! .*$:I!S'.! $A&1! .:*1'#,! 1/?A! H:C&?:1! A*C:! :C'8C:H! E:D'#H! $A:&.!
#*$/.*8! .'8:! '=! )'E&8:! *11&1$*#$1,!4.*H/*88D! *11/)&#4!.' 8:1! <.:C&'/18D! *11'?&*$:H! L&$A! $.*H&$&'#*8! ?')</$&#4!
H:C&?:1,!1/?A! *1! H:1R$'<! '.! 8*<$'<! 751I! Y&$A! $A:! .:1/8$!'=!$A&1!1/1$*&#:H!$.:#H,!)'E&8:!H:C&?:1!A*C:! E:?'):!
&)<'.$*#$! $''81! E'$A! ='.! &#H&C&H/*8! /1:.1!*#H! '.4*#&6*$&'#1I!5')<*#DV<.'C&H:H! )'E&8:! H:C&?:1! E:?*):! *1!
?'))'#<8*?:! *1! 8*<$'<1,! <.')<$&#4! $A:! #::H! ='.!$A:! H:C:8'<):#$! '=!*11:$! )*#*4:):#$! 1D1$:)1! ='.! $A:1:!
:?'1D1$:)1I!!
!
!
!
<4-.")8)=)>+?@4%&2+;)+*)&#+;&#)?+-&.")7"0&#")A2?4%'@B+;"C)2@"#&*&#4'&+;2)
)
:D,)!&?+;)
&EB+;")A82')F";C)
!4?2$;G)F4.4H()!)
&EB+;")I)
J"."42")/4'")
"/4/1$!+]]^!
c/#:!2a+a!
0:<$:)E:.!2a+^!
/&?";2&+;2)
2aa!U!b^!U!ef!))!
+22I^!U!b^I2!U!O]I]!V!+^P!
))!
+efI+!U!bd!U!bI]!))!
K"&GB')
g+a!4!
++f!V!+gg!4!
+2]!4!
>EL)
+bVE&$,!+b!Mh6,!!
UfbV?')<*$&E8:!
+![h6!1&#48:V?'.:,!"XM!
b^VE&$,!+I^![h6!H/*8V?'.:,!
"XM!
FEL)
Z'#:!
2aa!Mh6!7'L:.iX!
0[jg^a!
7'L:.iX!0:.&:1!b![jb^ga!
OQ/*HV?'.:P!
,"?+%()
+!M-!
g+2!M-!X"M!
+![-!(7;;Xe!X"M!
!'+%4G")
>#$:.#*8W!+!M-!
:;'"%;4.3!2!V!+b![-!
J"?+04-."3!)&?.'0;!/<!
$'!b^![-!
>#$:.#*8W!+b,!b^!'.!+2f![-!
/&2@.4()
^Ig!&#!k!+I^!&#
+ba<U!U!2]e<U!
)'#'?A.'):!E*?R8&$!
(5;!
^Ia!&#!H&*4'#*8!
0/<:.!"MF(@;!L&$A!
X-[-VM*$.&U!O7:#$&8:P!
^faUfaa!<U!Yi["!
O2ee!<<&P!
^Id!&#!H&*4'#*8!
+ee^Udga,!(@;VE*?R8&$!>70!
(5;,!e2b!<<&!O+2f!<UT?)P!
<&U:8!H:#1&$D!+bW]!*1<:?$!
.*$&'!
/4'4):;@$'2)
M&?.'<A'#:!
3'/?A1?.::#!L&$A!1$D8/1!
M/8$&V$'/?A!?*<*?&$&C:!
$'/?A1?.::#!H&1<8*D,!
")E&:#$!8&4A$!1:#1'.,!
)&?.'<A'#:,!eV*U&1!
M*4#:$'):$:.!
O5')<*11P,!*[70,!eV*U&1!
*??:8:.'):$:.!
!
M/8$&V$'/?A!$'/?A1?.::#,!
3.&<8:!)&?.'<A'#:,!eV*U&1!
4D.'1?'<:,!eV*U&1!
*??:8:.'):$:.,!;&4&$*8!
?')<*11,!&-:*?'#,!
7.'U&)&$D!1:#1'.,!")E&:#$!
8&4A$!1:#1'.,!=&#4:.<.&#$!
.:*H:.,!-*.'):$:.!
>+;;"#'&0&'()
2^aaVE<1!h*D:1V
?')<*$&E8:!)'H:)!
eeV<&#!?'##:?$'.!
]baaVE<1!4.'/<!e!=*U,!
75M5>"!$D<:!2!<'.$!
;/*8!E*#H!
5;M"2aaaT@iV;F!X:CI!
",!Y&M"j,!2Ig[!
O[0MT[7X0T@;[@P,!e[,!
Y&VS&!Ofa2I++ET4T#P,!
;(Z",!-8/:$''$A!eIa!
BM30Th07"mT;5Vh0;7",!!
5;M"!@iV;F!X:CI!"!*#H!
X:CI!-,![0MT@;[@,!Y&VS&,!
-8/:$''$A!^I2,!ZS5,![70!n!
[(FZ"00!
>4?"%4)
Z'#:!
J"4%3!g!M7,!d2a<,!h;!
C&H:',!<*#'.*)*!
M%+;'3!i["!
J"4%3!f!M7,!+afa<!h;!C&H:'!
.:?'.H&#4,!08'LV)'$&'#!
C&H:',!7*#'.*)*!
M%+;'3!+I2!M7!O+2fak]ba!
<&U:8!)*UIP,!d2a<!C&H:'!
.:?'.H&#4!
!
@C:#$/*88D,!$A:!?'#1/):.!*#H!:#$:.<.&1:!<:.1<:?$&C:1!'#!)'E&8:!H:C&?:!)*#*4:):#$!A&$!*!?.'11.'*H,!L&$A!$A:!
:):.4:#?:!'=! $A:! _-.&#4! N'/.!FL#! ;:C&?:`! O-NF;P!<*.*H&4),! E8:#H&#4! $A:! :#$:.<.&1:! *#H! ?'#1/):.! H:C&?:!
:?'1D1$:)I!3A:.:!*.:! 1:C:.*8! $D<:1! '=! -NF;! 1?A:):1!*C*&8*E8:! ='.! :#$:.<.&1:! /1*4:,!L&$A!$A:! R:D! H&1$&#?$&C:!
=*?$'.!E:&#4!M'E&8:!;:C&?:!M*#*4:):#$!OM;MP!<'8&?&:1,!H:$*&8&#4!LA&?A!H:C&?:1!*.:!*H)&11&E8:!*#H!LA*$!$D<:!
'=!?'#$.'8!&1!A:8H!'C:.!$A:)!O*??:11&E8:!H*$*,!*<<8&?*$&'#1!*#H!=/#?$&'#*8&$&:1PI!S&4/.:!+!&88/1$.*$:1!$A:!$.*H:V'==!
E:$L::#!?'#$.'8!*#H!#/)E:.!'=!H:C&?:1!&#!$A:!:#C&.'#):#$I!
)
M&G$%")8)=)N;'"%@%&2")?+-&.&'()2#B"?"2)
!
!
!
-NF;! ?'#1$&$/$:1! *! H:<*.$/.:! =.')! _5'.<'.*$:! FL#:H! 5'.<'.*$:! @#*E8:H`! O5F5@P! )'H:81,! )'C&#4! $'L*.H1!
1?A:):1!1/?A! *1! _5'.<'.*$:! FL#:H!7:.1'#*88D! @#*E8:H`! O5F7@P! *#H!_7:.1'#*88D!FL#:H! 5'.<'.*$:! @#*E8:H`!
O7F5@PI! Z*$/.*88D,! $A&1! A*1! *#! &)<*?$! &#! $:.) 1! '=! 1:?/.&$D! OLA&?A! L*1! '#:! '=! $A:! )*&#! ?'#?:.# 1! ='.! H:8*D:H!
*H'<$&'#!'=!1/?A!<'8&?&:1!*$!?'.<'.*$:!8:C:8P,!*1!?')<*#&:1!L*#$!$'!<.'$:?$!1:#1&$&C:!H*$*!*#H!*<<8&?*$&'#1I!!
!
YA:#! &$!?'):1! $'! 1:?/.&$D,!)'E&8:! H:C&?:1!A*C:! C:.D! 1<:?&=&?! ?A*.*?$:.&1$&?1! $A*$! 1:<*.*$:! $A:)! =.')! '$A:.!
H:C&?:1I!3A:!)'1$!#'$:L'.$AD!H&1$&#?$&'#!&1!$A:!8&)&$:H!E*$$:.D!8&=:,!&#A:.:#$!$'!)'E&8:!H:C&?:1,!*1!&$!&1!*81'!$A:!
.''$!'=! )'1$! '=!'$A:.!H&==:.:#?:1I!0&#?:!$A:!E*$$:.D! &1! =&#&$:!O/#8:11!.:?A*.4:HP!$A:!H:C&?:1\!?')</$&#4!<'L:.!
?*#!'#8D!E:! </1A:H! $A/1! =*.,!$'!$A:!<'&#$! LA:.:! &$1! ?'#$&#/'/1!/1*4:! H':1! #'$! ?'#1/):!$''!)/?A! :#:.4D! o!
E*$$:.D! 8&=:! &1! *81'! $A:! .:*1'#! LAD! $.*H&$&'#*8! *4:#$VE*1:H! 1:?/.&$D! 1D1$:)1! )/1$! E:! ?*.:=/88D! H:1&4#:H!*#H!
&)<8:):#$:H,!$'!)&#&)&6:!$A:!'C:.A:*H!&#$.'H/?:H!ED!$A:1:!*4:#$1I!5')<*?$!='.)!=*?$'.1!*81'!<'1:!?'#?:.#1!
LA:#!&$!?'):1!$'!?''8&#4!'.!&#?.:*1&#4!1$'.*4:!1<*?:I!"#'$A:.!?'#?:.#!&1!$A:!&#?.:*1:H!.&1R!'=!)&1<8*?:):#$!'.!
$A:=$!&#A:.:#$!$'!)'E&8:!H:C&?:1,!LA&?A!4.*#$1!*!)*8&?&'/1!/1:.!$A:!=.::H')!='.!*!?')<8:$:8D!H&==:.:#$!1/&$:!'=!
*$$*?R1!'.!<*$A1!$'!$A:! H*$*!1$'.:H!&#!$A:!H:C&?:I!Y&$A!1/?A! *??:#$/*$:H!H&==:.:#?:1,!&$!&1! '#8D! &#:C&$*E8:!$A*$!
1:?/.&$D!*11/.*#?:!&#!)'E&8:!H:C&?:1!=*?:1!*!H&==:.:#$!1:$!'=!?A*88:#4:1!=.')!?'#C:#$&'#*8!?')</$:.1\!1:?/.&$D!
.&1R1!*#H!H:=:#?:!1$.*$:4&:1,!L'.R&#4!L&$A!)'.:!8&)&$:H!.:1'/.?:1I!
!
3A&1! <*<:.! ='?/1:1! '#! 1/.C:D&#4! )'E&8:! H:C&?:! )*#*4:):#$! 1'8/$&'#1! ='.! 1:?/.&$D! <.'E8:)1,! .*#4&#4! =.')!
<.:C:#$&'#! $'! )'#&$'.&#4! *#H! )&$&4*$&'#! '=! $A.:*$1! *$! C*.&'/1! <'&#$1! &#! $A:! 1D1$:)\1! *#H! &$1! *<<8&?*$&'#1!
8&=:?D?8:1,!&H:#$&=D&#4!$A:!E:1$!*#H!L'.1$!<.*?$&?:1!='.!:#$:.<.&1:!:#C&.'#):#$1I!!
!
3A:!.:1$!'=!$A:!<*<:.!&1!'.4*#&6:H!*1!='88'L1I!0:?$&'#!2!H:8C:1!&#$'!$A:!*1<:?$1!'=!7.:C:#$&'#!&#!)'E&8:!H:C&?:1,!
'C:.C&:L&#4! $A:! )'1$! ?'))'#! /1:H! ):$A'H1! '=! :*?A! 1$.*$:4D,! $A:&.! E:#:=&$1! *#H! 1A'.$?')&#41I! 0:?$&'#! e!
<.:1:#$1!*!1&)&8*.!*#*8D1&1!='.! )'E&8:! H:C&?:! 1:?/.&$D! )'#&$'.&#4I! 0:?$&'#!^! :U*)&#:1!.:*?$&C:!*#H! )&$&4*$&'#!
$:?A#&Q/:1!:)<8'D:H!&#!)'E&8:!H:C&?:1I!0:?$&'#!g!?'#?8/H:1!$A:!<*<:.!L&$A!$A:!=&#*8!.:)*.R1I!
O9 E%"0";'&+;)
5/..:#$8D!$A:.:!&1! *#! *<<*.:#$!:)<A*1&1! '#! )'E&8:! H:C&?:! H*$*! 1:?/.&$D!$A.'/4A! <.:C:#$&C:! ):$A'H1,! LA:#!
?')<*.:H!L&$A!)'#&$'.&#4!'.!H:$:?$&'#!*<<.'*?A:1I!3A:!)'1$!'=$:#!?&$:H!?*/1:!='.!1/?A!H&1?.:<*#?D!A*1!$'!H'!
L&$A! $A:! 8:11! &#$./1&C:! #*$/.:! '=! <.:C:#$&'#! ):$A'H1,! LA&?A! *.:! *81'! ?A*.*?$:.&6:H! ED! 8'L:.! ?')</$*$&'#!
.:Q/&.:):#$1! *#H! E*$$:.D! 'C:.A:*HI! 3A&1! 1:?$&'#! H:$*&81! $A:! )'1$! ?'))'#! <.:C:#$&'#! ):$A'H1! ='/#H! &#!
)'E&8:!H:C&?:1,!*8'#4!L&$A!$A:&.!.:1<:?$&C:!<.'1!*#H!?'#1I!
!
3A:!*H'<$&'#!'=!<.:C:#$&C:!):$A'H1!&1!)'1$8D!H.&C:#!ED!$A:!#::H!$'!<.'$:?$!H:C&?:1!=.')!E:&#4!?')<.')&1:H,!
ED! )'#&$'.&#4! '.! )&#&)&6&#4! $A:! <'11&E&8&$D!'=! :U<8'&$&#4! 1<:?&=&?! *$$*?R! C:?$'.1I! >#! $A:! 8*$$:.! ?*1:! $A&1! )*D!
?'..:1<'#H!$'! $A:! *H'<$&'#! '=! ):?A*#&1)1!'.!<'8&?&:1!$A*$!.:H/?:!'.! :8&)&#*$:!$A:!*$$*?R!1/.=*?:!:U<'1/.:I!
M'1$!?'))'#8D!):?A*#&1)1!&#?8/H:W!
!
! !4;7-+H&;G!o!$A&1!*<<.'*?A!?.:*$:1!*! 1:<*.*$:! C&.$/*8! 1<*?:!='.!$A:!/#$./1$:H!*<<8&?*$&'#!'.!?'H:! $'! ./#!
L&$A!8&)&$:H!$'!#'!&#$:.*?$&'#!L&$A! '$A:.!*<<1!*#H!/#H:.!$&4A$! .:1$.&?$&'#1!&#!$A:! /#H:.8D&#4!A'1$!1D1$:),!
$A/1!H&)&#&1A&#4!$A:! <'11&E8:! *$$*?R!C:?$'.I!M'1$!)'H:.#!)'E&8:!H:C&?:!F<:.*$&#4!0D1$:)1! OF0P,!1/?A! *1!
"#H.'&H,!&F0!*#H!Y&#H'L1!7A'#:,!./#!$A:&.!*<<8&?*$&'#1!&#!1*#HE'U:H!:#C&.'#):#$1I!
! E"%2+;4.&P"7)1@@%+04.!o!$A&1!?'#1&1$1! '#! *! H:$*&8:H! *#*8D1&1! '=!:*?A! *<<8&?*$&'#\1! ?'#='.)&$D! $'! 1:?/.&$D!
<'8&?&:1! E:='.:! E:&#4! *<<.'C:H!='.! H&1$.&E/$&'#I! 3A:! )'1$! ?'))'#! :U*)<8:! '=! $A&1! $:?A#&Q/:! &1! $A*$! '=!
"<<8:\1! "<<! X:C&:L! 1D1$:)! LA:.:&#! :*?A! 1/E)&$$:H! *<<8&?*$&'#! 4':1! $A.'/4A! *! 1:.&:1! '=! ):$&?/8'/1!
.:C&:L!1$:<1!E:='.:!E:&#4!*C*&8*E8:!='.!H'L#8'*H!'#!$A:!"<<!0$'.:I!M&?.'1'=$!A*1!*!1&)&8*.!1D1$:)!&#!<8*?:!
$A:!Y&#H'L1! 7A'#:! "<<!0$'.:I! -D! ?'#$.*1$,![''48:! H':1! #'$! A*C:!*! 1&)&8*.! <'8&?D! ='.!*<<1! H:8&C:.:H! $'!
$A:! [''48:! 78*D! 0$'.:!O[''48:! 2a+b*P,! .:8D&#4! '#! &$1! /1:.1\! ?*<*?&$D! $'! &H:#$&=D! *#H! .:<'.$! )*8&?&'/1!
*<<8&?*$&'#1!'.!'#!3./1$:H!7*.$D!M*#*4:):#$!OLA&?A!&1!?'C:.:H!8*$:.PI!
! >+7")4;7) 122"') 122"22?";'!o!$A:.:!*.:! 1:C:.*8! L:88VR#'L#! $D<:1!'=! )*8L*.:! $A*$!?*#! E:! &H:#$&=&:H!ED!
H&1$&#?$! 1&4#*$/.:1I! M'1$! *#$&VC&./1! <.'$:?$&'#! ):?A*#&1)1! .:8D! '#! H*$*E*1:1! '=! 1/?A! ?*1:1! $'! &H:#$&=D!
<'$:#$&*8! $A.:*$1! $'! $A:! 1D1$:)I! "#'$A:.! L*D! '=! *11:11&#4! *#! *<<! &1! $'! ?A:?R! LA&?A! 1D1$:)! ?*881,!
=.*):L'.R1! *#H! ):$A'H1! &$! /1:1! *#H! ='.! LA*$! .:*1'#1I! -'$A! &F0!O"<<8:! 2a+b*P! *#H! Y&#H'L1! 7A'#:!
OM&?.'1'=$!2a+bP!:#='.?:!$A&1!E:A*C&'/.!$A.'/4A!$A:&.!.:1<:?$&C:!'==&?&*8!*<<8&?*$&'#!1$'.:1,!='.!LA&?A!:*?A!
1/E)&$$:H!*<<8&?*$&'#!/#H:.4':1!1?./$&#'/1!&#1<:?$&'#!E:='.:!E:&#4!*C*&8*E8:!='.!H'L#8'*HI!
!
!
! >+?@4%'?";'4.&P4'&+;Q&2+.4'&+;! o! $A:! E*1&?! <.:)&1:! ='.! $A&1! *<<.'*?A! &1! E*1:H! '#! $A:! ?')<8:$:!
1:<*.*$&'#! '=! $A:! /1:.\1! <:.1'#*8! 1<*?:! =.')! $A:! L'.R! 1<*?:! L&$A&#! $A:! H:C&?:,! *&)&#4! $'! *C'&H!
/##:?:11*.D!?'#$*?$!*)'#4!E'$A,!LA&8:!E*..&#4!$A.:*$1!?')&#4!=.')!$A:!<:.1'#*8!1<*?:I!3A:!L'.R1<*?:!&1!
/1/*88D! 1/EK:?$! $'! )/?A! 1$.&?$:.! 1:?/.&$D! *#H! E:A*C&'/.! .:1$.&?$&'#1! *#H! )&4A$! :C:#! #'$! *88'L! $A:!
&#1$*88*$&'#!'.!./##&#4!'=!#:L!1?.&<$1!*<*.$!=.')!$A:!H:=*/8$!*11:$1I!"1!*#!:U*)<8:,!1&#?:!"#H.'&H!"7>!8:C:8!
2+,!H:C&?:1! ?*#! A*C:! /1:.! *??'/#$1! $A*$! *.:! )*#*4:H!'#8D!ED!$A:!)*&#!*??'/#$,! LA&?A! ?*#! A*C:!*!)'.:!
8&)&$:H!1:$!'=!<:.)&11&'#1I!!
! <%$2'"7) E4%'() ,4;4G"?";'!o!$A&1! ):$A'H! .:8&:1! '#! $A:! C:.&=&?*$&'#! '=! $./1$:H! ?:.$&=&?*$:1,! R:D1! *#H!
1&4#*$/.:1!$'!)*#*4:!LA&?A!:#$&$&:1!?*#!&#$:.*?$!L&$A! $A:! 1D1$:)! '.! LA&?A!*<<8&?*$&'#1!?*#! E:! &#1$*88:HI!
S'.!&#1$*#?:,!'#8D! *! 1&#48:! $./1$:H! ?')</$:.! )&4A$! E:! *E8:! $'! L.&$:! $'! $A:! )'E&8:! H:C&?:1! 1$'.*4:!O*1&H:!
=.')! $A:! H:C&?:! &$1:8=P! '.! '#8D! *<<1! *<<.'C: H! *#H! <.'<:.8D! 1&4#:H! ED! *! ?')<*#D! E:='.:A*#H! )&4A$! E:!
&#1$*88:H! '#! $A:! H:C&?:I! "#H.' &H,! &F0! *#H! Y&#H'L1! 7A'#:! *88! A*C:! $A:! ?*<* E&8&$D! $'! &#1$*88! *#H! )*#*4:!
?/1$')! $./1$:H! :#$:.<.&1:! *<<8&?*$&'#1! &#! $A:! H:C&?:1,! E:! &$! $A.'/4A! H&.:?$! &#1$*88*$&'#! '.! ?:.$&=&:H! $A&.H!
<*.$D!*<<8&?*$&'#!1$'.:1!OY:&11!2a+ePI!
! E"%?&22&+;) !(2'"?2!o!'#:! L*D! '=! ?&.?/)C:#$&#4!$A:! '.H:*8! '=! *11:11&#4! *<<8&?*$&'#1\!=/#?$&'#*8&$&:1! '.!
/1:H!$''81!&1!$'!8:*C:! &$! $'! $A:! /1:.! $'! :&$A:.!*??:<$!'.!.:K:?$!*!8&1$!'=! 4.*#$:H! <:.)&11&'#1I! "#H.'&H! *#H!
&7A'#:! *<<1,! ='.! &#1$*#?:,! )/1$! :U<8&?&$8D! H:$*&8! LA&?A! 1D1$:)! =:*$/.:1! '.! A*.HL*.:! ?*<*E&8&$&:1! $A:D!
O)&4A$P!#::H!*??:11!$'I!S'.!"#H.'&H!H:C&?:1,!$A&1!&1!*!)*#H*$'.D!1$:<!<:.='.):H!E:='.:!$A:!*<<!&1!&#1$*88:H!
/#$'! $A:! H:C&?:! O[''48:! 2a+bEP! LA&81$! ='.! &7A'#:! H:C&?:1,! :*?A! &#H&C&H/*8! <:.)&11&'#! )/1$! E:! *1R:H!
H/.&#4!./#$&):! LA:#! #::H:H! ='.!$A:!=&.1$!$&):! O"<<8:! 2a+bEPI! >#! E'$A! 1?:#*.&'1,!$A&1!&#='.)*$&'#! ?*#! E:!
?A:?R:H! E:='.:! &#1$*88&#4! $A:! *<<! *#H! &$! &1! /<! $'! $A:! /1:.! $'! :C*8/*$:! *#H! *11/):! $A:! .&1R! '=! 4.*#$&#4!
*??:11!$'!1:#1&$&C:!=:*$/.:1!1/?A!*1!*??:11!$'!$A:!?*):.*!'.!0;!?*.H!1$'.*4:I!
! 1$'B";'&#4'&+;)4;7)N;#%(@'&+;)!#B"?"2!o!$A:1:!)*R:!/1:!'=!:#?.D<$&'#!1$*#H*.H1,!L&$A!$A:!<'11&E&8&$D!'=!
H:<:#H&#4! '#! $A:! :U&1$:#?:! '=! *#! :U$:.#*8! 1/<:.! /1:.I!3A:! &H:*! &1! $'! 8'?R! 1D1$:)! )*#*4:):#$! E:A&#H!
?')<8:U!<*11L'.HT7>Z!):?A*#&1)1!E:='.:!*#D! O'.!:C:#!:C:.DP!L.&$:!'.!.:*H!*?$&'#!&1!<:.='.):H!'#!$A:!
1D1$:)I! M'H:.#! )'E&8:! F0! 1/?A! *1! "#H.'&H,! &F0! *#H! Y&#H'L1! 7A'#:! *81'! ?'):! L&$A! $A:! '<$&'#! $'!
:#?.D<$!$A:!<A'#:!$'4:$A:.!L&$A!*! 8'?R&#4!):?A*#&1),!/1/*88D!*!7>Z!?'H:!'.!*!=&#4:.<.&#$,!L&$A'/$!LA&?A!
$A:!?'#$:#$1!'=!$A:!<A'#:!?*##'$!E:!*??:11:HI!
! R&?&'"7)<&?") 1##"22!o!$A&1!$:?A#&Q/:!)*R:1! /1:! '=! :<A:):.*8! =&U:H! 8:#4$A! 1:11&'#1,! *=$:.! LA&?A! *88! $A:!
1:.C&?:1! *.:! &#$:../<$:H! '.! *E'.$:H! LA:#! $A:! *88'?*$:H! $&):! 18'$! :U<&.:1I! Z'$! *C*&8*E8:!ED! H:=*/8$,! $A&1!
):$A'H!&1!/1/*88D!*?A&:C:H!*$!*<<8&?*$&'#!8:C:8,!/1&#4!$&):H!*??:11!$'R:#1I!
!
M'1$!'=! $A:1:! <.:C:#$&C:!):$A'H1!A*C:! E::#! &)<'.$:H!=.')!$A:! H:1R$'<!?')</$&#4!H')*&#,! *#H! :*?A! '#:!
A*1!&$1! 'L#! *HC*#$*4:1! *#H! H&1*HC*#$*4:1I!M'1$!'=!$A:)!$.D!$'! H:8:4*$:!.&1R! *11:11):#$!$'!*! )'.:! <'L:.=/8!
:#$&$D!O1:.C:.!'.!A/)*#P,!LA&8:!*81'!$.D&#4!$'!&)<'1:!*!)&#&)*8!.:1'/.?:!'C:.A:*H!'#!$A:!H:C&?:I!h'L:C:.,!*1!
?*#! E:! 1::#,! )'1$! '=! $A:1:! ):$A'H1! *.:! =*88&E8:! ='.! 1&)&8*.! .:*1'#1I! 7 .:C&'/18D! /#R#'L#! &#$./1&'#! ):$A'H1!
?'/8H! 1&)<8D! <*11! ED! $A:1:! 1:?/.&$D! <.:?*/$&'#1,! :U<8'.&#4! /#H&1?8'1:H! *$$*?R! C:?$'.1! *88'L&#4! $'!
?&.?/)C:#$&#4!$A:)I! "81',! 8:*C&#4! &$! /<! $'!:#H!/1:.! $'! =&4/.:! '/$! &=!*!8&1$!'=! <:.)&11&'#1! &1! /#*??:<$*E8:! '.!*!
<'$:#$&*8!A*6*.H! o! &$! .:8&:1!$''!)/?A! '#! ?'))'#V1:#1:! *#H!&1!1/EK:?$&C:!$'!$A:!1<:?&=&?!/1:.1\!*<$&$/H:1!*#H!
1R&881I!>#!=*?$,!'#:!'=!$A:!)'1$!?'))'#!<&$=*881!'=!1/?A!):$A'H1!&1!$A:!#::H!='.!$A:!/1:.!$'!=.:Q/:#$8D!H:*8!L&$A!
&#$./1&C:!C:.&=&?*$&'#!<.'?:H/.:1!.:Q/&.:H!='.!*<<8&?*$&'#!'.!?'#$:#$!&#1$*88*$&'#!o!/1:.1!$:#H!$'!1&)<8D!='.:4'I!
!
3*E8:! 2! *#*8D1:1!*$! LA&?A! )'):#$! '=! *#! *<<8&?*$&'#\1! 8&=:?D?8:! $A:! *8.:*HD!):#$&'#:H! <.:C:#$&'#! 1$.*$:4&:1!
*?$,!*#H!='.!LA&?A!)'E&8:!F<:.*$&#4!0D1$:)1!$A:D!*.:!*C*&8*E8:!'.!?*#!E:!&)<8:):#$:HI!
!
<4-.")O)=)>+?@4%&2+;)+*)S"()?+?";')+*)4#'&+;)*+%)@%"0";'&0")?"'B+72)
!
E%"T:;2'4..4'&+;)
:;2'4..4'&+;)
J$;'&?")
U!)104&.4-&.&'()
Sandboxing*
!
!
U!
"#H.'&H,!&F0,!Y&#H'L1!7A'#:!
Personalized*Approval*
U!
!
!
&F0,!Y&#H'L1!7A'#:!
Code*and*Assets*
Assessment*
U!
!
!
&F0,!Y&#H'L1!7A'#:!
Compartmentalization*
!
!
U!
"#H.'&H!
Trusted*Party*
Management*
!
U!
!
"#H.'&H,!&F0,!Y&#H'L1!7A'#:!
Permission*Systems*
!
U!
!
"#H.'&H,!&F0,!Y&#H'L1!7A'#:!
Authentication*Schemes*
!
!
U!
"#H.'&H,!&F0,!Y&#H'L1!7A'#:!
Limited*Time*Access*
!
!
U!
"#H.'&H,!&F0,!Y&#H'L1!7A'#:!
!
!
!
"1!L:!?*#!1::,!)*#D! <.:C:#$&'#!1$.*$:4&:1!*.:!:==:?$&C:!*$!./#$&):,!1'):$A&#4!$A*$!H':1!#'$!?A*#4:!L&$A!$A:!
:):.4:#?:! '=! *A:*HV'=V$&):! ?')<&8:.! $:?A#&Q/:1! ='.! 1'):! <8*$='.)1! O1/?A! *1! $A:! "X3T"#H.'&H! X/#$&):,!
LA&?A! .:<8*?:1! $A:! ;*8C&R! iM! O-'.#1$:&#! 2aafPP! LA&?A! ?'/8H,! &#! $A:'.D,! <.'C&H:! *#$&?&<*$:H! *#*8D1&1! '=!
*<<8&?*$&'#! <*D8'*H1I! 3A&1! &1! )*&#8D! H/:! $'! $A:! =*?$! $A*$! &$! &1! A*.H:.! $'! =&#H! 1/1<&?&'/1! <*D8'*H1! ED! 1'8:8D!
.:1'.$&#4! $'! E&#*.D! <*$$:.#! 1&4#*$/.:1! '.! '$A:.! 1$*$&?! ):$A' H1,! .*$A:.! $A*#! .:8D&#4! '#! ?'#$&#/'/1! E:A*C&'/.!
*#*8D1&1I!
V9 ,+;&'+%&;G)
M'#&$'.&#4!&1!?./?&*8!=:*$/.:!='.!1:?/.&$D!</.<'1:1,!*1!&$!?'#1$&$/$:1!*!R:D!?DE:.VH:$:?$&'#!?*<*E&8&$DI!>$!=*?:1!*!
H&==:.:#$!1:$!'=!?A*88:#4:1!=.')!$A:!<.:C:#$&'#!):?A*#&1)1!*8.:*HD!H:1?.&E:H!*1!&$!&1!&#$:#H:H!$'!H:$:?$!*#H!O&=!
<'11&E8:P! A*8$! )*8&?&'/1! *?$&C&$D! L&$A&#! $A:! 1D1$:)! *$! ./#$&):I! M'E&8:! H:C&?:! )'#&$'.&#4! *#H! H:$:?$&'#!
$:?A#&Q/:1!)*D!/1:! H&==:.:#$!*<<.'*?A:1,!1:*.?A&#4!='.!1&4#*$/.:! <*$$:.#1! '.!H:C&*$&'#1!=.')!$A:!:1$*E8&1A:H!
#'.)*8!E:A*C&'/.!O'.!=&#4:.<.&#$1P!#'$!'#8D!*$!$A:!H:C&?:V8:C:8,!E/$!*81'!&#C'8C&#4!1:C:.*8!H&==:.:#$!H:C&?:1,!&#!*!
?''<:.*$&C:! '.! H&1$.&E/$:H! =*1A&'#I! S'.! $A&1! </.<'1:,! $A:D! )*D! /1:! 1D1$:)! '.! H:C&?:! 1$*$:! *#H! /1*4:!
&#='.)*$&'#,! 1/?A! *1! A*.HL*.:! ?A*.*?$:.&1$&?1,! E*1:! 1$*$&'#! .:4&1$.*$&'#! H*$*,! >7! *HH.:11:1,! 57B! /1*4:,!
*44.:4*$:H!H*$*!$.*#1=:.1!'.!357T>7!1$*?R!1$*$:,!$'4:$A:.!L&$A!*<<8&?*$&'#!*#H!1:.C&?:!L'.R8'*H!<.'=&8:1,!E/&8$!
/1&#4! =:*$/.:1! 1/?A! *1! *<<! C:.1&'#1,! H*$*! $.*==&?,! 57B! /1*4:! *#H! E*$$:.D! ?'#1/)<$&'#I! 3A:1:! $:?A#&Q/:1!
<.'C&H:!$A:!):*#1!$'!H:$:?$!&11/:1!1/?A!*1!H:C&?:!&#=:?$&'#,!A&K*?R&#4!*#H!*<<8&?*$&'#!<:.)&11&'#!)&1/1:!E'$A!
*$!H:C&?:V8:C:8! *#H! :C:#! &#C'8C&#4!1:C:.*8!H&==:.:#$!H:C&?:1,!&#!*!?''<:.*$&C:! '.!H&1$.&E/$:H!=*1A&'#I!3A:!)'1$!
?'))'#!)'#&$'.&#4!*#H!H:$:?$&'#!*<<.'*?A:1!*.:W!
!
! D"B40&+$%)1;4.(2&2)o! $A&1!):$A'H!&1!='?/1:H!'#!LA*$!&1!*#H!&1#\$!:U<:?$:H! =.')!:*?A!$D<:!'=!*<<8&?*$&'#I!
S'.! &#1$*#?:,! *<<1! '.! ?'H:! ?*#! E:! 1?./$&#&6:H! *$! ./#$&):,! /1&#4! )*#*4:H! :U:?/$&'#! :#C&.'#):#$1! '.!
1<:?&=&?! &#1$./):#$*$&'#!$'! H:$:?$! *#D! *#')*8'/1! '.! 1/1<&?&'/1! *?$&C&$D ,! L&$A! $A:! </.<'1:! '=! H:$:?$&#4!
&#=.:Q/:#$!*?$&C&$D! <*$$:.#1!'.! *??:11! $'!1:#1&$&C:!&#='.)*$&'#!&#!$A:!H:C&?:I!3A&1!<.'?:11! ?*#! E:! ?'/<8:H!
L&$A!*!$.*&#&#4!<A*1:!$'!:1$*E8&1A!*!E*1:8&#:!E:A*C&'/.!)'H:8!='.!R#'L#!*<<8&?*$&'#1,!'.!L&$A!('4!"#*8D1&1,!
$A:!#:U$!)'#&$'.&#4!):$A'H!'#!$A&1!8&1$!O-'1:!2aafp!-/.4/:.*!2a++PI!
! R+G)1;4.(2&2! o! $A:! A'1$! 1D1$:)! 8'41!&#='.)*$&'#! .:4*.H&#4! &#H&?*$'.1! 1/?A! *1! ):)'.D!*#H!E*$$:.D!/1*4:,!
1$'.*4:! *??:11:1,! H*$*! $.*#1=:.1! *#H! 1:.C&?:1! /1:H! O-8/:$''$A,! Y&VS&,! M'E&8:! ;*$*,! :$?IP! $'!.:?'.H! *<<!
*?$&C&$DI!3A:!8'41!*.:!$A:#!<:.&'H&?*88D!1:#$!$'!*!$./1$:H!1:.C:.!$'!H:8:4*$:!$A:!A:*C&:.!*#H!)'.:!.:1'/.?:!
&#$:#1&C:!*#*8D1&1!E/.H:#!'/$!'=!$A:!)'E&8:!H:C&?:,!*8E:&$!1'):!)&#'.!<.:V<.'?:11&#4!*#H!*#*8D1&1!?*#!1$&88!
E:!<:.='.):H!'#!1&$:I!('4! &#$:4.&$D!):*1/.:1!1A'/8H!E:!?'#1&H:.:H!'#!E'$A!:#H<'&#$1!='.!$A&1!):$A'H!$'!
L'.R!<.'<:.8D!O-:?A:.!2aafp!M*6/)H*.!2a++p!h*8&8'C&?!2a+2PI!
! !(2'"?) >4..) W++S&;G) A!>WC! o! $A:! *?$! *HH&#4! &#1$./):#$*$&'#!$'! $A:! A'1$! 1D1$:)! ='.! )'.:! =&#:V4.*&#:H!
8'44&#4!'=!$A:!1D1$:)\1!=/#?$&'#!?*881!O='.!#*$&C:!"7>1!*#H!'$A:.!=.*):L'.R1P,!L&$A!$A:!4'*8!'=!:*1&#4!$A:!
)'#&$'.&#4!$*1R!OY&88:)1!2aadPI!3A&1!?*#! A:8<! H:$:?$!/##:?:11*.D!/1:!'=!)'E&8:!H:C&?:!=:*$/.:1!1/?A! *1!
$A:!?*):.*!'.!)&?.'<A'#:I!S'.!&#1$*#?:,!$A:!HD#*)&?!1A*.:H!8&E.*.D!):?A*#&1)!&#!"#H.'&H!)*R:1!/1:!'=!*!
1$./?$/.:! o! $A:! 7.'?:H/.:! (&#R*4:! 3*E8:! o! $A*$! &1! /1:H ! $'! &)<8:):#$! $A:! .:1'8C&#4! ):?A*#&1)! ='.! $A:!
HD#*)&?! 8&#R:.!O7(31! *88'L! $'! &)<8:):#$! 8*6D! E&#H&#4,! <.'C&H&#4! 1 $/E! =/#?$&'#1! LA&?A! <:.='.)! ):)'.D!
8'*H! '<:.*$&'#1! '#! $A:! [8'E*8! F==1:$! 3*E8:! $'! .:$.&:C:! $A:! =/#?$&'#1\! .:*8! *HH.:11PI!7(3! <*$?A&#4! ?*#! E:!
/1:H!$'!&)<8:):#$!?'H:!&#1$./):#$*$&'#!):?A*#&1)1!$'!H:$:?$!*#')*8'/1!1&$/*$&'#1,!<.:$$D!)/?A!&#!8&#:!
L&$A!$A:!?'#?:<$!1A'L#!'#!S&4/.:!2I!
! J$;'&?")E"%?&22&+;) >B"#S2! o! *??:11! $'! 1<:?&=&?! 1:#1&$&C:! A*.HL*.:!'.!1'=$L*.:!=:*$/.:1! .:Q/&.:!*<<1!$'!
:U<8&?&$8D! .:Q/:1$!<:.)&11&'#1! *$! ./#$&):I! S'.! :U*)<8:,! ?*):.*! *??:11!?*#! E:! )*#*4:H! /1&#4! $A&1!
$:?A#&Q/:W!*#! *<<! 1A'/8H! .:Q/:1$! <:.)&11&'#!$'! /1:! $A:!H:C&?:\1! ?*):.*! :C:.D!$&):! $'! 1$'<!*! )*8&?&'/1!
*<<! =.')! 1$:*8$A&8D! ?'88:?$&#4! /#L*#$:H! <&?$/.:1! '=! $A:! /1:.! '.! A&1!1/..'/#H&#41I! "#H.'&H! *#H! &F0! A*C:!
./#$&):!<:.)&11&'#!C:.&=&?*$&'#1,!*88'L&#4!='.!$A:!/1:.!$'!$'448:!'.!'<$!'/$!<:.)&11&'#1!*=$:.!&#1$*88&#4!$A:!
*<<8&?*$&'#!O[''48:!2a+b?p!M/88&4*#!2a+^PI!
!
!
!
!
M&G$%")O)=)>4..)B++S&;G)"H4?@.")A*+%)&;'"%#"@'&+;)+*)4;)"H@+%'"7)*$;#'&+;)-".+;G&;G)'+)4)2B4%"7).&-%4%(C))
!
3A:!)*&#!*HC*#$*4:!'=!)'#&$'.&#4!1:?/.&$D!1$.*$:4&:1!&1!*!E:$$:.!*#H!)'.:!.:=&#:H!*11:11):#$!'=!$A:!1:#1&$&C:!
H*$*!*#H!LA*$!*?$&'#1!'.!*<<8&?*$&'#1!?'/8H!E:! ?')<.')&1&#4!&$!OA'<:=/88DP!&#!$&):!='.!&#$:.C:#$&'#I!3A:D!*81'!
:#*E8:!*!1$.&?$:.!?'#$.'8!'=!LA*$!&1!*??:<$*E8:!E:A*C&'/.!$A.'/4A!*!)'.:!H:$*&8:H!8'41!*#H!C*.&*E8:!8&)&$*$&'#1I!
[&C:#! $A:! )'.:! 8&)&$:H! ?')</$&#4! <'L:.! *#H! E*$$:.D! 8&=:,! 1'):! '=! $A:1:! ):$A'H1! ?*#! :*1&8D! E:?'):! *#!
'C:.R&88!='.! $A:! H:C&?:!'.!.:8D!$''! A:*C&8D! '#! ?'#1&1$:#$! *#H!1D1$:)*$&?!?'##:?$&'#! L&$A! 1:?/.:! #:$L'.R1!*#H!
1:.C:.1,! LA&?A! )&4A$! #'$! E:! *! <'11&E&8&$D! *88! $'4:$A:.! H:<:#H&#4! '#! $A:! /1:! ?*1:! 1?:#*.&'I! "#'$A:.!
H&1*HC*#$*4:!&1!$A:!.&1R! )*.4&#! ='.! <'$:#$&*8! &#$:.C:#$&'#1! &#! _#:*.! .:*8!$&):`! LA&?A,!H:<:#H&#4! '#! #:$L'.R!
1$*$/1,! 1D1$:)! .:1'/.?:1,! ?.D<$'4.*<A&?! ?')<8:U&$D! *#H! ?'##:?$&C&$D! &11/:1! )&4A$! .:1/8$! &#! *#! /#*??:<$*E8:!
8*$:#?DI!
!
>$! &1! L'.$A! ):#$&'#&#4! $A*$! 1' ):! )'#&$'.&#4! ):$A'H1! ?*##'$! E:! &)<8:) :#$:H! '/$! '=! $A:! E'UI! 3A:! <:.=:?$!
:U*)<8:!&1! 0D1$:)! 5*88! h''R&#4,! LA&?A! &1!C:.D!A*.H!$'!<:.='.)!'.! :C:#! &)<'11&E8:! '#! )'1$!)'E&8:!'<:.*$&#4!
1D1$:)1! L&$A'/$! .''$&#4! '.! ./##&#4! *! ?/1$')! )'H&=&:H! C:.1&'#! '=! $A:! '.&4&#*8! F0I! "#H.'&H! &1! $A:! )'1$!
?'))'#8D!*H'<$:H!F0!='.!$A&1!R&#H!'=!E*..:H!)'#&$'.&#4!$:?A#&Q/:1,!E:?*/1:!&$!&1!E*1:H!'#!$A:!"#H.'&H!F<:#!
0'/.?:!7.'K:?$!o!&$!?*#!E:!)'.:!:*1&8D!*8$:.:H!*$!?'.:!8:C:8!$'!*??'))'H*$:!$A:!H:1&.:H!?A*#4:1,!*#H!&$!?*#!./#!
'#!*!C*.&:$D!'=!H:C&?:1!*#H!A*.HL*.:,!/#8&R:!&F0!*#H!Y&#H'L1!7A'#:I!!
!
3*E8:! e! :U*)&#:1! LA&?A! $A.:*$1! :*?A! )'#&$'.&#4! ):$A'H! ?*#! A:8< ! <.:C:#$I! "<*.$! =.')! X/#$&):! 7:.)&11&'#!
5A:?R1,!*88!):$A'H1!1::)!:Q/*88D!:==:?$&C:!*4*&#1$!)'1$!$A.:*$1I!h'L:C:.,!05h!&1!/1/*88D!#'$!.:*H&8D!*C*&8*E8:!
'#! )'1$! )'E&8:! H:C&?:1!*#H! -:A*C&'/.! "#*8D1&1! .:Q/&.:1! *! <.&'.&!$.*&#&#4,! )*R&#4! ('4! "#*8D1&1! $A:! )'1$!
:==:?$&C:!'/$V'=V$A:VE'U!$:?A#&Q/:I!
!
<4-.")V)=)>+?@4%&2+;)+*)@%"0";'"7)'B%"4'2)-()?+;&'+%&;G)?"'B+7)
!
E%&0&."G")
N2#4.4'&+;)
K+%?2X)
<%+Y4;2X)
Z&%$2"2)
J"2+$%#"Q)
/4'4)
,&2$2")
!@(64%")
<B"*'X)
/"0&#")
>.+;&;G)
U!)104&.4-&.&'()
Behaviour*Analysis*
!
U!
U!
U!
U!
"#H.'&H,!&F0,!
Y&#H'L1!7A'#:!
Log*Analysis*
!
U!
U!
U!
U!
"#H.'&H,!&F0,!
Y&#H'L1!7A'#:!
System*Call*
Hooking*
U!
U!
U!
U!
!
"#H.'&H!
Runtime*Permission*
Checks*
!
!
U!
!
!
"#H.'&H,!&F0,!
Y&#H'L1!7A'#:!
!
"8$A'/4A! <.:C:#$&'#! *#H! )'#&$'.&#4! ?*#! H.*1$&?*88D! &)<.'C:! 1:?/.&$D,! $A:.:! L&88! *8L* D1! E:! #:L! )*8L*.:! '.!
*$$*?R! C:?$'.1! *4*&#1$! LA&?A! $A:D! *.:! &#:==:?$&C:I! 3A:! E:1$! :U*)<8:1! '=! $A&1! R&#H! '=! )*8L*.:! *.:! 6:.'! H*D,!
/#H&1?8'1:H! *#H! /#H:$:?$*E8:! :U<8'&$1,! .*#4&#4! =.')! $*.4:$! 1<:?&=&?! *<<8&?*$&'#1! 1/?A! *1! Y&#H'L1\! 0$/U#:$!
OF\M/.?A/! *#H! S*88&:.:! 2a++P! $'! 48'E*8! <*#H:)&?1! 1/?A! *1! "#H.'&H\1! 0$*4:=.&4A$! OY*11:.)*##!2a+gPI!
M&$&4*$&'#!):?A*#&1)1,!H&1?/11:H!#:U$,!*HH.:11!1/?A!$A.:*$1I!
!
!
[9 J"4#'&0")4;7)?&'&G4'&+;)2'%4'"G&"23)*%+?)&2+.4'"7)7"0&#"2)'+)+%G4;&P4'&+;4.)422"'2)
;:1<&$:!$A:!:U&1$:#?:!'=!:)E:HH:H!1:?/.&$D!)'#&$'.&#4!*#H!<.:C:#$&C:!):?A*#&1)1!L&$A&#!1:C:.*8!)'E&8:!F0!
=.*):L'.R1,! LA&?A! ?*#! E:! =/.$A:.! ?')<8:):#$:H! L&$A! '$A:.! $:?A#&Q/:1! *#H! :U$:.#*8! '.! $A&.HV<*.$D!
?')<'#:#$1,! &$! &1! &)<'11&E8:! $'! 4/*.*#$::! ?')<8:$:! *#H! =*&8V<.''=!<.'$:?$&'#! =.')! *#D! .&1RI! 3A:.:='.:,!*#D!
?')<.:A:#1&C:!*<<.'*?A!$'L*.H1!)'E&8:!1:?/.&$D!)/1$!*81'!:#?')<*11!1&$/*$&'#1!L:.:!<.'$:?$&'#1!A*C:!E::#!
'C:.?'):!*#H! $A:!H:C&?:!A*1! E::#!?')<.')&1:HI!X:*?$&'#!*#H! )&$&4*$&'#! $:?A#&Q/:1!*.:!&)<'.$*#$!='.!1/?A!
1&$/*$&'#1,!<.'C&H&#4!*!L*D!$'!)&#&)&6:!'.!?'#$*&#!$A:!<'$:#$&*8!.&1R!*.&1&#4!=.')!1/??:11=/8!&#$./1&'#!*$$:)<$1I!
-:D'#H!$A:! ?'#$:U$!'=!$A:!)'E&8:! F0,! 1/?A!):?A*#&1)1!*81'!)*R:! 1:#1:!=.')!*#!'.4*#&6*$&'#*8!<:.1<:?$&C:,!
<.')'$&#4!$A:!H:C:8'<):#$!'=!4''H!<.*?$&?:1!='.!.:*?$&'#!*#H!)&$&4*$&'#!'=!1:?/.&$D!&#?&H:#$1,!LA&?A!)/1$!E:!
?8'1:8D!?'/<8:H!L&$A!*11:$!*#H!8&=:?D?8:!)*#*4:):#$!1$.*$:4&:1I!!
!
0'):! '=! $A:! <.:C:#$&C:! *#H! )'#&$'.&#4! $:?A#&Q/:1! *8.:*HD! H:1?.&E:H! &#! $A:! <.:C&'/1! 0:?$&'#1! ?*#! E:!
?'#1&H:.:H!='.!*$$*?R!C:?$'.!'.!C/8#:.*E&8&$D!)&$&4*$&'#!$:?A#&Q/:1!'#!$A:&.!'L#,!E/$!$A:.:!*.:!'$A:.!):*#1!$'!
$.D!*#H!.:<*&.!*!?')<.')&1:H!H:C&?:,!'.!$'!*$!8:*1$!)&#&)&6:!$A:!H*)*4:!&$!?*#!H'W!
!
! !"#$%&'() E+.&#&"2!o!L.&$$:#! H'?/):#$1! L&$A! '.4*#&6*$&'#*8VL&H:! ./8:1! *#H! <.*?$&?:1! $A*$! )/1$! E:!
:#='.?:HI! S'.! &#1$*#?:,! $A:1:! H'?/):#$1! )/1$!&H:#$&=D! $A:! H:C&?:1! $A*$! ?*#! ?'##:?$! $'! $A:!
'.4*#&6*$&'#*8!&#=.*1$./?$/.:,! LA*$! $D<:1! '=! H*$*! $A:D! 1A' /8H! ?'#$*&#,! LA*$! ?'#1$&$/$:1! *1! 1:#1&$&C:!
H*$*,! *! 8&1$! '=! 1/<<'.$:H! '<:.*$&#4! 1D1$:)1! *#H! *<<8&?*$&'#1,! *#H! $:.)1! '=! *??:<$*E8:! /1:! *#H!
<:#*8$&:1!='.!)&1/1:I!
! /+#$?";'4'&+;!o!H'?/):#$1!H:H&?*$:H!$'!1?./$&#&6:!1/??:11=/8!*#H!/#1/??:11=/8!*1<:?$1!'=!*!<.'K:?$,!
*<<8&?*$&'#!'.!1D1$:),!*8'#4!L&$A!&H:#$&=&:H!$A.:*$1,!A'L!$A:D!L:.:!A*#H8:H!*#H!A'L!$A:D!?'/8H!A*C:!
E::#!*C'&H:HI!B1/*88D!<:.='.):H!*$!$A:! :#H!'.!*$!<.:VH:=&#:H!&$:.*$&C:!1$*4:1!'=!$A:! 8&=:?D?8:,!*!7'1$!
M'.$:)!H'?/):#$!&1!*!?'))'#!:U*)<8:!'=!$A&1!1$.*$:4DI!
! E4'#B)!$@@+%'!o!$A:!*E&8&$D!$'!1/E)&$!/<H*$:1!'.!<*$?A:1!='.!*#!*<<8&?*$&'#!'.!1D1$:)!L&$A'/$! A*C&#4!
$'! <AD1&?*88D! *??:11! $A:! H:C&?:!?*#! E:! 1/==&?&:#$! $'! =&U! #:L8D! H&1?'C:.:H! C/8#:.*E&8&$&:1! '.! H&1*E8:!
*$$*?R!C:?$'.1I!!
! R+;G)<"%?)!$@@+%')AR<!C!o! *=$:.! H&1$.&E/$&#4!$A:!1D1$:)T*<<8&?*$&'#!$A:.:!&1!*!$&):!=.*):!='.!LA&?A!
$A:! H:C:8'<:.! *4.::1! $'! <.'C&H:! 1/<<'.$! ='.! 1:?/.&$D! /<H*$:1I! 5*#! E:! ?./?&*8! $'! ?8'1:! :U<8'&$:H!
C/8#:.*E&8&$&:1!'.!.:#H:.!$A:)!/#/1*E8:I!
! J"?+'") >+;'%+.!o!&=! *! H:C&?:! E:?'):1! ?')<.')&1:H! &$! ?*#! E:! L&<:H,! .:1:$,! 1A/$H'L#! '.! 8'?R:H!
.:)'$:8D,! .:)'C&#4! $A:! <'11&E&8&$D! ='.! *#! :1?*8*$:H! ?')<.')&1:! '.! ?'#$&#/:HT.:?/..:#$! *??:11! $'!
1:#1&$&C:!H*$*I!
! R+#4'&+;)<%4#S&;G!o!&=!*!)'E&8:!H:C&?:!&1!1$'8:#!*#H!:#H1!/<!&#!*!?'#1<&?/'/1!8'?*$&'#!&$!?*#!E:!$.*?R:H!
H'L#!'.!1&)<8D!8'?*$:H!*=$:.!$A:!$A:=$!&1!.:<'.$:HI!
! J"#4..)*+%) 1;4.(2&2!o!$A:! <'$:#$&*88D! $*.4:$:H! H:C&?:1! )/1$! E:!<:.&'H&?*88D! .:?*88:H! ='.! *! $:)<'.*.D!
1D1$:)!*#H!*<<8&?*$&'#!*11:11):#$I!3A&1!):$A'H!?*#!E:!&#C*1&C:!$'!<:.1'#*8!H*$*!&=!$A:!H:C&?:!&1!*81'!
/1:H!='.!<:.1'#*8!</.<'1:1!'.!'/$1&H:!'=!$A:!:#$:.<.&1:!:#C&.'#):#$I!
B1:.! S::HE*?R!o!*! ):*#1! ='.! $A:! /1:.! '=! $A:! H:C&?:! $'! .:<'.$! *#D! 1/1<&?&'/1! '.! *#')*8'/1! E:A*C&'/.,! #'!
)*$$:.! A'L! .&H&?/8'/1! &$! )&4A$! 1::)I! 3A&1! )/1$!E:! :#='.?:H! L&$A! *! 1:#1:! '=! $./1$! E:$L::#! $A:! /1:.! *#H!
?''.H&#*$'.1T=::HE*?RV.:?:&C:.1I!
3*E8:!^! *#*8D1:1! $A:! )'):#$! *$! LA&?A! :*?A! '=! $A:! *HH.:11:H! 1$.*$:4&:1! ?*#! A:8<!A*#H8:! *! <'$:#$&*8!$A.:*$W!
E:='.:,!H/.&#4!'.!*=$:.!&$!&1!H:$:?$:H!'.!H':1!H*)*4:I!3A:!=&.1$!1$*4:!1A'/8H!#'$!E:!?'#=/1:H!L&$A!<.:C:#$&'#,!
1&#?:!&$!&1!*11/):H!$A*$!*!1/??:11=/8!&#$./1&'#!'.!*$$*?R!A*1!*8.:*HD!'??/..:HI!
!
<4-.")[)=)!'%4'"G()#+?@4%&2+;)4##+%7&;G.()6&'B)'B%"4')2'4G")
!
D"*+%")-"&;G)4#'&0")
/$%&;G)
1*'"%)
Security*Policies*
U!
!
!
Patch*Support*
U!
!
U!
Long*Term*Support*
!
U!
U!
Remote*Control*
!
U!
U!
Location*Tracking*
!
!
U!
Recall*for*Analysis*
U!
U!
U!
User*Feedback*
!
U!
!
*Documentation*
!
!
U!
!
!
!
"1!:U<:?$:H! =.')! $A:! H:=&#&$&'#!'=!_)&$&4*$&'#`,!$A:.:! &1!4.:*$!:)<A*1&1!)&$&4*$&#4!*! $A.:*$!*=$:.!&$!A*1!H'#:!
H*)*4:!)'.:! $A*#! $A:! <.:C:#$&C:!*#H!)'#&$'.&#4!*1<:?$1! $A*$!L:!A*C:!*8.:*HD!H&1?/11:H,! LA&?A!A*C:!)'.:!
<.:V:)<$&C:!*#H! <:.1&1$:#$! ?A*.*?$:.&1$&?1I! 3A:!)'.:! H:$*&8:H! )&$&4*$&'#! 1$.*$:4&:1!*#H! 1:?/.&$D!
?'/#$:.):*1/.:1!*.:!*H'<$:H,!$A:!:*1&:.!&$!?*#!E:?'):!$'!'C:.?'):!$A.:*$1I!S&4/.:!e!:U:)<8&=&:1!A'L!*88!$A:!
&H:#$&=&:H!<.:C:#$&C:,!)'#&$'.&#4!*#H!)&$&4*$&'#!):$A'H1! ?*#!E:!?')E&#:H!&#$'!*!1:?/.&$D!8&=:?D?8:!)'H:8!='.!
)'E&8:!*11:$!)*#*4:):#$,!&H:#$&=D&#4!$A:!$A.::!)*&#!<A*1:1!*$!LA&?A!1:?/.&$D!:<&1'H:1!?*#!E:!&H:#$&=&:H!*#H,!
<'11&E8D,!<.:C:#$:HI!
!
M&G$%")V)=)!"#$%&'().&*"#(#.")*+%)?+-&.")422"')?4;4G"?";')
!
S&4/.:!e!&1!.:)&#&1?:#$!'=!*!1&)<8:.!FE1:.C:VF.&:#$V;:?&H:V"?$!OFF;"P!8''<!O-'DH!+]]gP,! *!?'))'#!1$.*$:4&?!
*<<.'*?A!$'!)&8&$*.D!*#H!?')):.?&*8!'<:.*$&'#1!*#H!8:*.#&#4!<.'?:11:1I!>$!='?/1:1!'#!*4&8&$D!LA:#!H:*8&#4!L&$A!
*!$A.:*$,!&#!'.H:.!$'! )&$&4*$:! &$1! *HC*#?:1!*#H! H*)*4:! *$!*#D!4&C:#!<'&#$! &#! $&):,! 8:*.#&#4!=.')! *#D! ='.)! '=!
&#</$!*#H!=::HE*?R!'E$*&#:HI!S&4/.:!^!<'.$.*D1!*!1&)<8&=&:H!C:.1&'#!'=! $A:!-'DH\1!FF;"!8''<,!.:<.:1:#$&#4!*88!
$A:1:!*1<:?$1I!
!
M&G$%")[)T)!&?@.&*&"7)UU/1).++@)
!
>=!1A'/8H!E:! 1$.:11:H! $A*$! $A:!'E1:.C*$&'#! 1$*4:! ?*#! E:!.:<8*?:H!ED! *! L*.#&#4! '.!#'$&=&?*$&'#!=.')! *! 1:?/.&$D!
'.4*#&1),!1/?A!*1!*!5@X3I!S'.!&#1$*#?:,!&=!*!.:1:*.?A:.TH:C:8'<:.!=&#H1!C/8#:.*E&8&$&:1!&#!*#!*<<8&?*$&'#T1D1$:)!
A:!1A'/8H!?'#$*?$!$A:!H:C:8'<:.!*E'/$!A&1!=&#H&#41!*#H,!&=!4&C:#!<:.)&11&'#!O&#!?*1:!'=!?''.H&#*$:H!H&1?8'1/.:P,!
)*R:!$A:)!*C*&8*E8:!*1!1''#!*1!<'11&E8:,!'.!1&)<8D!)*R:!$A:)!</E8&?!*1!1''#!*1!A:!&1!?:.$*&#!'=!$A:)!O&#!?*1:!
'=!=/88!H&1?8'1/.:PI!"??'.H&#48D! L&$A! $A:!$&)&#4!*#H!#*$/.:! '=!$A:! *##'/#?:):#$,!$A:! .:*?$&'#! $&):!E:$L::#!
$A:!#'$&=&?*$&'#!*#H!$A:!H:<8'D):#$!'=!*H:Q/*$:!1:?/.&$D!):*1/.:1! ?*#!E:!Q/&$:! 1A'.$,!<.')<$&#4!$A:! )'E&8:!
H:C&?:!)*#*4:):#$!$:*)1!$'!:#='.?:!?'#1:.C*$&C:!1:?/.&$D!):?A*#&1)1!*1!*!<.:C:#$&C:!):*1/.:I!
\9 M&;4.)J"?4%S2)
3A:!*&)! '=!$A&1!1/.C:D! L*1!$'!<.'C&H:!*#!*#*8D1&1!*E'/$!$A:!*C*&8*E8:!1:?/.&$D!$:?A#&Q/:1!$A*$!?*#!E:!/1:H! $'!
)*U&)&6:! $A:! 'C:.*88! 1*=:$D! '=! :#$:.<.&1:!*#H! <:.1'#*8!H*$*! *#H! *<<8&?*$&'#1!1$'.:H! *#H! /1:H! '#! )'E&8:!
H:C&?:1I! YA&8:! *8)'1$! *88!$A:! H:1?.&E:H! $:?A#'8'4&:1! A*C:! $A:&.! 1<:?&=&?! *HC*#$*4:1! *#H! 1A'.$?')&#41,! $A&1!
<*<:.\1!'EK:?$&C:!$'!1A'L!A'L!$A:D!)*D!L'.R!$'4:$A:.!$'!?.:*$:!*!)'.:!.'E/1$!)'E&8:!1:?/.&$D!:#C&.'#):#$I!!
"81',!$A&1! <*<:.! <.'C&H:H!*#!'C:.C&:L!*E'/$!)&$&4*$&'#!*#H! .:*?$&'#!1$.*$:4&:1!$A*$! &1!)'1$8D!='?/1:H!'#!$A:!
'.4*#&6*$&'#*8! <:.1<:?$&C:,!*81'! E:&#4! *8&4#:H! L&$A! *11:$! *#H! *<<! )*#*4:):#$! <.*?$&?:1I! S&#*88D,! *#! FF;"V
&#1<&.:H!)'H:8! ='.! )*#*4&#4! 1:?/.&$D! :C:#$1!&1! *81'! <.'<'1:H,! LA&?A! E.&#41! $'4:$A:.! *88! $A:! H&1?/11:H!
?*$:4'.&:1!'=! 1:?/.&$D! ):?A*#&1)1!O<.:C:#$&'#,! )'#&$'.&#4,! .:*?$&'#T)&$&4*$&'#P! L&$A&#! *! ?'))'#! 8&=:?D?8:!
)*#*4:):#$!1$.*$:4DI!
!
!
1#S;+6."7G"?";'2)
3A&1!L'.R! L*1! ?*..&:H!'/$! L&$A! $A:! 1/<<'.$!'=! $A:! 5:#$.'!2a2a! 7.'K:?$! M'E&3./1$! O5@Z3XFVa+Va2^dVS@;@XV
aaee^eP,! LA&?A! &1! <*.$! '=! $A:! 5"3X@Z@! <.'K:?$! M'E&3./1$! O5"2af! o! M'E&3./1$PI! 3A:! */$A'.1!L'/8H!8&R:! $'!
$A*#R!$A:! '$A:.!?'#1'.$&/)!<*.$#:.1!&#C'8C:H!&#!$A:1:!<.'K:?$1!='.!$A:!C*8/*E8:!H&1?/11&'#1!*#H!?'#$.&E/$&'#1!
$'!$A:!L'.R!<.:1:#$:H!&#!$A&1!<*<:.I!
J"*"%";#"2)
"8=*8Q&,!qI,!"84A*)H&,!XI!*#H!Y*QH*#,!MI!O2a+gP!"#H.'&H!78*$='.)!M*8L*.:!"#*8D1&1I,!bO+P,!<<I+^ao+^bI!
"<<8:!"<<!5:#$:.!O2a+b*P!"<<!0$'.:!X:C&:L![/&H:8&#:1I!"C*&8*E8:!*$W!A$$<1WTTH:C:8'<:.I*<<8:I?')T*<<V
1$'.:T.:C&:LT4/&H:8&#:1T!O8*1$!*??:11:H!F?$'E:.!2+,!2a+bPI!
"<<8:!;:C:8'<:.1!O2a+bEP!"E'/$!>#='I<8&1$!q:D1!*#H!i*8/:1I!"C*&8*E8:!*$W!
A$$<1WTTH:C:8'<:.I*<<8:I?')T8&E.*.DT?'#$:#$TH'?/):#$*$&'#T[:#:.*8TX:=:.:#?:T>#='78&1$q:DX:=:.:#?:T>#$.'
H/?$&'#T>#$.'H/?$&'#IA$)8!O8*1$!*??:11:H!F?$'E:.!2+,!2a+bPI!
".)*#H',!"I!:$!*8I!O2a+2P!5A*#4&#4!/1:.!*$$&$/H:1!$'!1:?/.&$D!&#!E.&#4!D'/.!'L#!H:C&?:!O-NF;P!n!$A:!?8'/HI!
Z:$L'.R!0:?/.&$D,!2a+2OeP,!<<IgofI!
-:?A:.,!MI!*#H!S.:&8&#4,!SI5I!O2aafP!3'L*.H1!;D#*)&?!M*8L*.:!"#*8D1&1!$'!>#?.:*1:!M'E&8:!;:C&?:!0:?/.&$DI!>#!
7.'?I!'=!0>5h@Xh@>3,!7V+2f,!<<I^2eo^eeI!"C*&8*E8:!*$W!A$$<1WTTLLLI1?'</1I?')T&#L*.HT.:?'.HI/.&r:&Hs2V12IaV
f^fded^e2]dn<*.$#:.>;s^an)Hgsgbf**fea=b=E=g]?*]abfeH^?g?e^H2eI!
-'.#1$:&#,!;*#I!_7.:1:#$*$&'#!'=!;*8C&R!iM!>#$:.#*81`!O7;SPI![''48:I!A$$<1WTT1&$:1I4''48:I?')T1&$:T&'TH*8C&RV
C)V&#$:.#*81T2aafVagV2]V7.:1:#$*$&'#VF=V;*8C&RViMV>#$:.#*81I<H=!O8*1$!*??:11:H!'#!Z'C:)E:.!++,!2a+bPI!
-'1:,!"I!:$!*8I!O2aafP!-:A*C&'.*8!H:$:?$&'#!'=!)*8L*.:!'#!)'E&8:!A*#H1:$1I!7.'?::H&#4!'=!$A:!b$A!&#$:.#*$&'#*8!
?'#=:.:#?:!'#!M'E&8:!1D1$:)1,!*<<8&?*$&'#1,!*#H!1:.C&?:1!V!M'E&0D1!\af,!<I22gI!
-'DH,!cI!XI!O+]]gP!3A:!@11:#?:!'=!Y&##&#4!*#H!('1&#4I!"!;&1?'/.1:!'#!Y&##&#4!*#H!('1&#4I!
-'DH,!cIXI!O+]dbP!;:1$./?$&'#!*#H!5.:*$&'#I!"!;&1?'/.1:!'#!Y&##&#4!*#H!('1&#4,!O0:<$:)E:.P,!<<Ieo]I!
-/.4/:.*,!>I,!t/./$/6*,!BI!*#H!Z*HK)V3:A.*#&,!0I!O2a++P!5.'LH.'&HW!-:A*C&'.V-*1:H!M*8L*.:!;:$:?$&'#!0D1$:)!
='.!"#H.'&HI!7.'?::H&#41!'=!$A:!+1$!"5M!L'.R1A'<!'#!0:?/.&$D!*#H!<.&C*?D!&#!1)*.$<A'#:1!*#H!)'E&8:!H:C&?:1!
V!070M!\++,!<I+gI!
;&1$:=*#',!"I,!:$!*8I!O2a++P!0:?/.:MD;.'&HW!@#='.?&#4!0:?/.&$D!&#!$A:!M'E&8:!;:C&?:1!(&=:?D?8:I!
@18*A&,!MI!:$!*8I!O2a+gP!-NF;W!5/..:#$!1$*$:!*#H!1:?/.&$D!?A*88:#4:1I!>05">@!2a+^!V!2a+^!>@@@!0D)<'1&/)!'#!
5')</$:.!"<<8&?*$&'#1!*#H!>#H/1$.&*8!@8:?$.'#&?1,!O"<.&8!2a+^P,!<<I+f]o+]2I!
S&.:@D:!O2a+gP!t:.'V;*D!;*#4:.W!"!0/.C:D!'=!t:.'V;*D!"$$*?R1!*#H!YA*$!3A:D!0*D!"E'/$!$A:!3.*H&$&'#*8!
0:?/.&$D!M'H:8I,!<I+bI!
S.:&,!;I!O2a+2P!5'#H/?$&#4!*!X&1R!"11:11):#$!='.!M'E&8:!;:C&?:1I!
[''48:!"#H.'&H!;:C:8'<:.1!O2a+b*P!"<<!M*#&=:1$I!"C*&8*E8:!*$W!
A$$<1WTTH:C:8'<:.I*#H.'&HI?')T4/&H:T$'<&?1T)*#&=:1$T)*#&=:1$V&#$.'IA$)8!O8*1$!*??:11:H!F?$'E:.!2+,!2a+bPI!
[''48:!"#H.'&H!;:C:8'<:.1!O2a+bEP!(*/#?A!5A:?R8&1$I!"C*&8*E8:!*$W!
A$$<1WTTH:C:8'<:.I*#H.'&HI?')TH&1$.&E/$:T$''81T8*/#?AV?A:?R8&1$IA$)8!O8*1$!*??:11:H!F?$'E:.!2+,!2a+bPI!
[''48:!"#H.'&H!;:C:8'<:.1!O2a+b?P!X:Q/:1$&#4!7:.)&11&'#1!*$!X/#!3&):I!"C*&8*E8:!*$W!!
A$$<1WTTH:C:8'<:.I*#H.'&HI?')T$.*&#&#4T<:.)&11&'#1T.:Q/:1$&#4IA$)8!O8*1$!*??:11:H!F?$'E:.!2+,!2a+bPI!
h*8&8'C&?!MI,!"I!0/E*1&!O2a+2P!>#$./1&'#!;:$:?$&'#!'#!0)*.$<A'#:1I!
h*..&1,!MI"I!*#H!7*$$:#,!qI7I!O2a+gP!M'E&8:!;:C&?:!0:?/.&$D!>11/:1!Y&$A&#!$A:!BI0I!;&1*HC*#$*4:H!-/1&#:11!
@#$:.<.&1:!7.'4.*)I!c'/.#*8!'=!>#='.)*$&'#!3:?A#'8'4D!M*#*4:):#$,!jji>O+P,!<<I^bogdI!
c**$/#,!MI[I,!c**$/#,!@I"I"I!*#H!M'1:.,!XI!O2a+^P!0:?/.&$D!?'#1&H:.*$&'#1!='.!$*E8:$VE*1:H!:h:*8$A!*<<8&?*$&'#1I!
5@BX!Y'.R1A'<!7.'?::H&#41,!+2g+O7*A&!2a+^P,!<<I2doebI!
c*.*)&88',!;I,!-I!S/.A$,!*#H!"I!"4*.L*8!O2a+^P!M'E&8:!i&.$/*8&6*$&'#!3:?A#'8'4&:1I!>#W!i&.$/*8&6*$&'#!3:?A#&Q/:1!
='.!M'E&8:!0D1$:)1,!+^$A!:HI,!i'8!de,!<<I!gV2aI!
q'?A:.,!7I!:$!*8I!O2aa^P!0:?/.&$D!*1!*!#:L!H&):#1&'#!&#!:)E:HH:H!1D1$:)!H:1&4#I!;"5!\a^W!7.'?::H&#41!'=!$A:!
^+1$!*##/*8!;:1&4#!"/$')*$&'#!5'#=:.:#?:,!<<IdgeodbaI!
(:E:R,!-I,!;:4&.):#?&,!qI!*#H!-.:&$#:.,!MIhI!O2a+eP!>#C:1$&4*$&#4!$A:!>#=8/:#?:!'=!0:?/.&$D,!7.&C*?D,!*#H!(:4*8!
5'#?:.#1!'#!@)<8'D::1\!>#$:#$&'#!$'!B1:!-NF;!M'E&8:!;:C&?:1I!")?&1,!O2aafP,!<<I+ofI!
!
!
(::,!cI,!3I!q&),!*#H!cI!q&)!O2aa]P!_@#:.4DV:==&?&:#$!X/#V$&):!;:$:?$&'#!'=!M*8L*.:V&#=:?$:H!@U:?/$*E8:1!*#H!
;D#*)&?!(&E.*.&:1!'#!M'E&8:!;:C&?:1`,!0'=$L*.:!3:?A#'8'4&:1!='.!S/$/.:!;:<:#H*E8:!;&1$.&E/$:H!0D1$:)1I!
(&,!lI!*#H!58*.R,![I!O2a+eP!M'E&8:!0:?/.&$DW!"!(''R!"A:*HI!>@@@!0:?/.&$D!n!7.&C*?D,!++O+P,!<<Idfof+!
(/',!cI,!*#H!)I!q*#4!O2a++P!_"<<8&?*$&'#!('?RE'U!='.!M'E&8:!;:C&?:!0:?/.&$D`,!@&4A$A!>#$:.#*$&'#*8!5'#=:.:#?:!
'#!>#='.)*$&'#!3:?A#'8'4DW!Z:L![:#:.*$&'#1I!
M*6/)H*.,!0I!*#H!7*$/.&,!"I!O2a++P!3*)<:.V.:1&1$*#$!H*$*E*1:!8'44&#4!'#!)'E&8:!H:C&?:1I!>#$:.#:$!0:?/.&$D!
OY'.8H5>0P,!2a++!Y'.8H!5'#4.:11!'#,!<<I+bgo+daI!
M&?.'1'=$!Y&#H'L1!;:C!5:#$:.!O2a+bP!3A:!*<<!?:.$&=&?*$&'#!<.'?:11I!"C*&8*E8:!*$W!
A$$<1WTT)1H#I)&?.'1'=$I?')TL&#H'L1T/L<T</E8&1AT$A:V*<<V?:.$&=&?*$&'#V<.'?:11!O8*1$!*??:11:H!F?$'E:.!2+,!
2a+bPI!
M&:$$&#:#,!MI,!*#H!7I!h*8'#:#I!O2aabP!_h'1$V-*1:H!>#$./1&'#!;:$:?$&'#!='.!"HC*#?:H!M'E&8:!;:C&?:1`,!2a$A!
>#$:.#*$&'#*8!5'#=:.:#?:!'#!"HC*#?:H!>#='.)*$&'#!Z:$L'.R&#4!*#H!"<<8&?*$&'#1!O">Z"uabP,!i'8!+I!
M/88&4*#,!-I!O2a+^P!3A:!X&4A$!Y*D!3'!"1R!B1:.1!S'.!&F0!7:.)&11&'#1,!3:?A?./#?AI!"C*&8*E8:!*$W!
A$$<1WTT$:?A?./#?AI?')T2a+^Ta^Ta^T$A:V.&4A$VL*DV$'V*1RV/1:.1V='.V&'1V<:.)&11&'#1T!O8*1$!*??:11:H!F?$'E:.!
2+,!2a+bPI!
Z*E&,!XIMI!*#H!M'A*)):H,!XI"I!O2a+gP!0)*.$<A'#:1!78*$='.)!0:?/.&$D!*!5')<*.&1'#!0$/HDI,!gO++P,!<<I^^o^fI!
F8*8:.:,!MI,!:$!*8I!O2a+gP!_"!X:C&:L!'=!-.&#4!N'/.!FL#!;:C&?:!'#!0:?/.&$D!>11/:1`,!0"[@!F<:#!"<.!2a+g,!g!O2P!
2+gf2^^a+ggfaed2p!;F>W!+aI++ddT2+gf2^^a+ggfaed2I!
F\M/.?A/,!(I,!S*88&:.:,!ZI!O2a++P!_Ye2I0$/U#:$!H'11&:.`,!0D)*#$:?!YA&$:!7*<:.,!S:E./*.D!2a++I!!
XA::,!qI,!c:'#,!YI!*#H!Y'#,!;I!O2a+2P!_0:?/.&$D!.:Q/&.:):#$1!'=!*!)'E&8:!H:C&?:!)*#*4:):#$!1D1$:)`,!
>#$:.#*$&'#*8!c'/.#*8!'=!0:?/.&$D!*#H!&$1!"<<8&?*$&'#1,!bO2P,!<<IegeoegfI!
0?*.=',!"I!O2a+2P!Z:L!1:?/.&$D!<:.1<:?$&C:1!*.'/#H!-NF;I!7.'?::H&#41!V!2a+2!d$A!>#$:.#*$&'#*8!5'#=:.:#?:!'#!
-.'*HE*#H,!Y&.:8:11!5')</$&#4,!5'))/#&?*$&'#!*#H!"<<8&?*$&'#1,!-Y55"!2a+2,!<<I^^bo^g+I!
0?A)&H$,!"IV;I,!:$!*8I!O2aa]P!_0$*$&?!"#*8D1&1!'=!@U:?/$*E8:1!='.!5'88*E'.*$&C:!M*8L*.:!;:$:?$&'#!'#!"#H.'&HI`,!
2aa]!>@@@!>#$:.#*$&'#*8!5'#=:.:#?:!'#!5'))/#&?*$&'#1,!H'&W+aI++a]T&??I2aa]Ig+]]^fbI!!
0A*E$*&,!"I!BI!q*#'#'C,!*#H!NI!@8'C&?&!O2a+aP!_>#$./1&'#!;:$:?$&'#!='.!M'E&8:!;:C&?:1!B1&#4!$A:!q#'L8:H4:V
-*1:H,!3:)<'.*8!"E1$.*?$&'#!M:$A'H`,!c'/.#*8!'=!0D1$:)1!*#H!0'=$L*.:,!i'8!fe,!Z'I!f,!<<I!+g2^o+gedI!
0R'C'.'H*,!"I!*#H![*)*D/#'C,!;I!O2a+gP!0:?/.&#4!)'E&8:!H:C&?:1W!M*8L*.:!)&$&4*$&'#!):$A'H1I!c'/.#*8!'=!
Y&.:8:11!M'E&8:!Z:$L'.R1,!BE&Q/&$'/1!5')</$&#4,!*#H!;:<:#H*E8:!"<<8&?*$&'#1,!bO2P,!<<Idfo]dI!
0'/<<*D*,!MI!*#H!0?*.='#:,!qI!O2a+eP!Z>03!0<:?&*8!7/E8&?*$&'#!faaV+2^![/&H:8&#:1!='.!M*#*4&#4!$A:!0:?/.&$D!'=!
M'E&8:!;:C&?:1!&#!$A:!@#$:.<.&1:I,!<IeaI!
3:*),!BIV5I5IXI!O2a+aP!3:?A#&?*8!>#='.)*$&'#!7*<:.V3>7V+aV+agVa+!5DE:.!3A.:*$1!$'!M'E&8:!;:C&?:1I!B0V5@X3!
3:?A#&?*8!>#='.)*$&'#!7*<:.,!<<I+o+bI!
i:#/4'<*8,!;I,!*#H![I!h/I!O2aafP!_@==&?&:#$!0&4#*$/.:!-*1:H!M*8L*.:!;:$:?$&'#!'#!M'E&8:!;:C&?:1`,!M'E&8:!
>#='.)*$&'#!0D1$:)1,!i'8!^,!Z'I!+,!<<I!eeo^]I!
iv&1v#:#,!3I!:$!*8I!O2a+gP!;:=:#H&#4!)'E&8:!H:C&?:1!='.!A&4A!8:C:8!'==&?&*81!*#H!H:?&1&'#V)*R:.1,!<<I+o+adI!
Y*11:.)*##,![I!O2a+gP,!_i/8#:.*E&8&$D!Z'$:!iBw]2^]g+!o!"#H.'&H!0$*4:=.&4A$!?'#$*&#1!)/8$&<8:!
C/8#:.*E&8&$&:1`I!5@X3I!"C*&8*E8:!*$W!A$$<1WTTLLLIREI?:.$I'.4TC/81T&HT]2^]g+!O8*1$!*??:11:H!Z'C:)E:.!2,!2a+bPI!
Y:&11,!"I!O2a+eP!h'L!$'!;:<8'D!@#$:.<.&1:!M'E&8:!"<<1I!@#$:.<.&1:!"<<1!3'H*D,!"C*&8*E8:!*$W!
A$$<WTTLLLI:#$:.<.&1:*<<1$'H*DI?')T?.)TA'LV$'VH:<8'DV:#$:.<.&1:V)'E&8:V*<<1IA$)8!O8*1$!*??:11:H!
F?$'E:.!2+,!2a+bPI!
Y&88:)1,!5I,!3I!h'86,!*#H!SI!S.:&8&#4!O2aadP!_3'L*.H!"/$')*$:H!;D#*)&?!M*8L*.:!"#*8D1&1!B1&#4!5Y0*#HE'U`,!
>@@@!0:?/.&$D!*#H!7.&C*?D,!i'8!g,!Z'I!2,!<<I!e2Ve],!M*.?AI!
Y/,!SI!*#H!5A:#,!5I,!O2a+^P!0:#1&$&C:!;*$*!7.'$:?$&'#!'#!M'E&8:!;:C&?:1I,!gO]P,!<<Iefo^+I!
... Security is usually part of broader Mobile Device and Application Management (MDAM) platforms, where security is just another aspect of device management. Those platforms allow the management and the remote deployment of applications, configurations, and security policies on fleets of corporate mobile devices [4]. ...
... It allows the configuration and enforcement of VPN usage on work profiles, protecting work-related data communications over public/external networks. An extensive analysis of those MDAM platforms, from a security viewpoint, is provided by [4]. Table 1 summarizes their security-related functionality and features. ...
Article
Full-text available
Quite often, organizations are confronted with the burden of managing mobile device assets, requiring control over installed applications, security, usage profiles or customization options. From this perspective, the emergence of the Bring Your Own Device (BYOD) trend has aggravated the situation, making it difficult to achieve an adequate balance between corporate regulations, freedom of usage and device heterogeneity. Moreover, device and information protection on mobile ecosystems are quite different from securing other device assets such as laptops or desktops, due to their specific characteristics and limitations—quite often, the resource overhead associated with specific security mechanisms is more important for mobile devices than conventional computing platforms, as the former frequently have comparatively less computing capabilities and more strict power management policies. This paper presents an intrusion and anomaly detection framework specifically designed for managed mobile device ecosystems, that is able to integrate into mobile device and management frameworks for complementing conventional intrusion detection systems. In addition to presenting the reference architecture for the proposed framework, several implementation aspects are also analyzed, based on the lessons learned from developing a proof-of-concept prototype that was used for validation purposes.
... In contrast, platform attestation [4], [5] has a wider scope, covering the integrity of the hardware and software on top of which apps run -for example, that a known-good operating system version is running and root privileges are available only to trusted system components. The main use case of platform attestation is enterprise mobile device management [6], [7], where it is exploited to establish trust in PCs and mobile devices [8] before the devices are allowed to access protected resources, or to connect to internal networks. In smartphones, platform attestation is increasingly combined with app attestation as an anti-abuse mechanism to detect misuse of services, such as cheating in online games. ...
Conference Paper
Full-text available
Platform attestation allows consumer devices to report their security state to relying parties such as cloud services and network gateways. In contrast to more restricted forms of remote attestation, such as key attestation, platform attestation provides more information to the verifier, but is complex to deploy, which has hindered its adoption in the industry. Recently, new approaches such as device health attestation (DHA) have been introduced that simplify the remote attestation process especially from the relying party's perspective. A common denominator in these developments is the use of an external, usually cloud-based verification service that is physically separate from the relying party. The service transforms attestation evidence into a health report -- a standard and simplified format that is easier for relying parties to process. In this paper, we survey the state of art in platform attestation in the industry, focusing on Windows DHA, Samsung Knox DHA, Android Play Integrity, Huawei SysIntegrity, and Apple's App integrity and Device Check.
... Lima et al. [13] performed thorough research on securing and monitoring mobile device assets by discussing the mobile devices' security consequences and discussing the survey on the frameworks, innovations, and use cases for mobile device security management. eir research focused on studying the solutions of the management of the mobile devices, considering the preventive methods and techniques related to monitoring and mitigating threats at different nodes in the system. ...
Article
Full-text available
With the presence of the Internet and the frequent use of mobile devices to send several transactions that involve personal and sensitive information, it becomes of great importance to consider the security aspects of mobile devices. And with the increasing use of mobile applications that are utilized for several purposes such as healthcare or banking, those applications have become an easy and attractive target for attackers who want to get access to mobile devices and obtain users’ sensitive information. Developing a secure application is very important; otherwise, attackers can easily exploit vulnerabilities in mobile applications which lead to serious security issues such as information leakage or injecting applications with malicious programs to access user data. In this paper, we survey the literature on application security on mobile devices, specifically mobile devices running on the Android platform, and exhibit security threats in the Android system. In addition, we study many reverse-engineering tools that are utilized to exploit vulnerabilities in applications. We demonstrate several reverse-engineering tools in terms of methodology, security holes that can be exploited, and how to use these tools to help in developing more secure applications.
Article
Full-text available
Information such as bank access, password, and location data stored in the smartphone has become the primary target for cybercriminals. As the users are frequently stated as the weakest link in the information security chain, therefore, there is a need to investigate users' security behavior in the smartphone context. Using the systematic literature review approach, a total of 48 research articles were analyzed to summarizes the developments of Information Security literature on smartphone users. The findings suggest, Qualitative Approach are most adopted approach and Protection Motivation Theory is the most adopted theory in this field. Keywords: Smartphone user; Information Security; Security Behaviour; Literature review. eISSN: 2398-4287 © 2022. The Authors. Published for AMER ABRA cE-Bs by E-International Publishing House, Ltd., UK. This is an open-access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer-review under the responsibility of AMER (Association of Malaysian Environment-Behavior Researchers), ABRA (Association of Behavioral Researchers on Asians), and cE-Bs (Centre for Environment-Behavior Studies), Faculty of Architecture, Planning & Surveying, Universiti Teknologi MARA, Malaysia
Article
Full-text available
This paper reports on the results of a mobile device security awareness and practice survey of one special type of small business referred to as Disadvantaged Business Enterprises (DBEs) within the U.S. Department of Transportation. As government contractors, DBEs have access to government information systems. With recent cyber-attacks on large corporations through their less secure subsidiaries, it is essential that DBEs take security precautions and do not become an illegitimate point of entry to government systems. This paper discusses the roles, responsibilities, and IT security weaknesses within the U.S. DOT and surveys 1088 DBEs about their mobile device security and mobile device business usage. Results demonstrate that the majority of DBEs failed to adequately address even the most basic mobile device security practices, potentially exposing government systems, which are already poorly secured. This paper provides a list of basic mobile device security recommendations for immediate DBE adoption.
Article
Full-text available
Nowadays Smart phones and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing Unit), Storage and installing numerous applications. So, security aspect of those devices should be taken into account seriously since phone users access wide range of none secure wireless networks and download applications on free sources which may contain harmful viruses and/or malwares. The best way of securing mobile devices is to enforce good security policy through operating systems. This paper will walk around main necessary principles of security in mobile operating systems. Then will compare those principles for four main mobile operating systems such as Android from Google, BlackBerry from research motion, Windows mobile phone from Microsoft and iOS from Apple. Finally, this paper will provide some potential steps to achieve proper mobile security.
Article
Full-text available
Malware on mobile handsets has always been a point of concern for its users. With the widespread adoption of smartphones and tablets and the emergence of centralized application markets it started to represent a significant threat. This situation has led to the development of defence methods for securing mobile devices coming from operating system developers, antivirus vendors and security researchers. In this paper we focus on the solutions proposed by security researchers which include both methods inherited from malware detection on personal computers and new methods specific to mobile device environment. This paper gives an overview of the history and development of mobile malware and provides a survey of the methods proposed for malware mitigation on mobile devices in the last years. © 2015 Innovative Information Science and Technology Research Group All Rights Reserved.
Article
Full-text available
Nowadays, many mobile devices such as phones and tablets are used in the workplace. A large amount of data is being transferred from one person to another. Data transfer is used for several different fields. Many companies and institutions are focusing on research and development on the way to further protect sensitive data. However, sensitive data still get leaks on mobile devices. To analyze how sensitive data get leak, a simulation on transferring sensitive data is developed. In this paper, we present the analysis of mobile security problem dealing with sensitive data from getting out. The goals in our research are for users to have a greater understanding on how data is being transferred and prevention sensitive data from being stolen. Our work will benefit mobile device users and help to prevent sensitive data from being stolen. Our experiments show different ways to safely transfer information on mobile devices by testing three methods types, which are back-up, encryption, and lock plus wipe data.
Article
Full-text available
Mobile devices have evolved from simple devices, which are used for a phone call and SMS messages to smartphone devices that can run third party applications. Nowadays, malicious software, which is also known as malware, imposes a larger threat to these mobile devices. Recently, many news items were posted about the increase of the Android malware. There were a lot of Android applications pulled from the Android Market because they contained malware. The vulnerabilities of those Applications or Android operating systems are being exploited by the attackers who got the capability of penetrating into the mobile systems without user authorization causing compromise the confidentiality, integrity and availability of the applications and the user. This paper, it gave an update to the work done in the project. Moreover, this paper focuses on the Android Operating System and aim to detect existing Android malware. It has a dataset that contained 104 malware samples. This Paper chooses several malware from the dataset and attempting to analyze them to understand their installation methods and activation. In addition, it evaluates the most popular existing anti-virus software to see if these 104 malware could be detected.
Article
Full-text available
Mobile computing has supplanted internet computing because of the proliferation of cloud-based applications and mobile devices (such as smartphones, palmtops, and tablets). As a result of this, workers bring their mobile devices to the workplace and use them for enterprise work. The policy of allowing the employees to work with their own personal mobile devices is called Bring Your Own Devices (BYOD). In this article, we discuss BYOD’s background, prevalence, benefits, challenges, and possible security attacks. We then review contributions of academic researchers on BYOD. The Universiti Putra Malaysia online databases (such as IEEE Xplore digital library, Elsevier, Springer, ACM digital library) were used to search for peer-reviewed academic publications and other relevant publications on BYOD. The Google Scholar search engine was also used. Our thorough review shows that security issues comprise the most significant challenge confronting BYOD policy and that very little has been done to tackle this security challenge. It is our hope that this review will provide a theoretical background for future research and enable researchers to identify researchable areas of BYOD.
Article
Full-text available
Many enterprises are adopting Mobile Device Management systems to monitor the status and control the functionalities of smart phones and tablet PCs in order to solve the security problems of confidential enterprise data being leaked whenever a device is misused or lost. However, no criteria have been established as yet to evaluate whether such Mobile Device Management systems correctly provide the basic security functions needed by enterprises and whether such functions have been securely developed. Therefore, this paper proposes security requirements of a Mobile Device Management system by modeling a threat and applying a security requirement engineering methodology based on Common Criteria.
Conference Paper
Full-text available
Tablet computers are slowly being put into use in hospitals and primary care both by clinicians and patients. This paper will ex-amine security needs of tablet-based eHealth applications, and explore how conventional security mechanisms can be adapted to this space. Our approach will be demonstrated by examining a particular eHealth appli-cation; a tablet-based Pain Body Map for use in palliative care.
Chapter
In order to achieve increased adoption and sustainability “bring your own device” (BYOD) schemes within the enterprise, mobile virtualization is rapidly becoming a very attractive choice because it provides both employee and enterprise with flexibility while addressing the privacy concerns of the user and meeting the organizations security requirements. Allowing BYOD devices in the enterprise requires policies in place that govern how devices will be used and how they will be managed while maintaining end user flexibility. A number of technologies for mobile virtualization have been developed over the last few years which range from sophisticated mobile device policy management, to hypervisors and container based separation [JaKa01].