Abstract
With the dramatic shift of internet use away from desktop and laptop PCs toward smartphones and tablets, protection thresholds for application, device and communication security have significantly lowered. Most attempts on reversing this situation by means of converting standard mobile devices into tamper-proof equipment have proven to leave ample space for vulnerability of mobile processes and communication content. The only high efficacy method of sheltering against spying and fraud is seen in a new approach where a dedicated piece of discrete hardware is tasked with all security related operations while the standard cell phone or tablet remains unchanged, providing only its connectivity capabilities. The increasing cost caused by e.g. fraud in the area of mobile banking provides the background to economically justify this effort, which can in parallel support many other areas of mobile security.
Chapter PDF
Similar content being viewed by others
References
Andrejevic, M.: Facebook als neue Produktionsweise. In: Leistert, O., Rohle, T. (eds.) Generation Facebook: Uber das leben im social net, pp. 31–49 (2011)
Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In: Proceedings of the 19th Annual Network and Distributed System Security Symposium, pp. 5–8 (2012)
Suarez-Tangil, G., Tapiador, J.E., Peris-Lopez, P., Ribagorda, A.: Evolution, Detection and Analysis of Malware for Smart Devices. IEEE Communications Surveys & Tutorials, 1–27 (2013)
Frick, J., Rainer, B.: Method for identifying a mobile phone user or for eavesdropping on outgoing calls. Patent: EP1051053
Texas Criminal Lawyer Blog. Devices that Track Cell Phone Signals Violate Fourth Amendment, Say Privacy Advocates (2013), https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/200455/bis-13-p184-2013-information-security-breaches-survey-technical-report.pdf
Andriotis, P., Oikonomou, G., Tryfonas, T.: Forensic Analysis of Wireless Networking Evidence of Android Smartphones. In: Proc. IEEE International Workshop on Information Forensics and Security (WIFS 2012), Tenerife, Spain, pp. 109–114. IEEE (December 2012)
Internet Service Providers. Guiding Principles on Cyber Security. Guidance for Internet Service Providers and Government (December 2013)
Andriotis, P., Tryfonas, T., Oikonomou, G., Yildiz, C.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: Proc. 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2013), pp. 1–6. ACM Press (2013)
Petroulakis, N.E., Tragos, E.Z., Fragkiadakis, A.G., Spanoudakis, G.: A lightweight framework for secure life-logging in smart environments. Information Security Technical Report 17(3), 58–70 (2013); Security and Privacy for Digital Ecosystems
Department for Business Innovation and Skills. Information Security Breaches Survey (2013)
Secocard. The security Platform, http://www.secocard.ch
EMPELOR GmbH, http://www.empelor.ch
Akram, R.N., Markantonakis, K., Mayes, K.: Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 214–227. Springer, Heidelberg (2012)
Akram, R.N., Markantonakis, K.: Smart Cards: State-of-the-Art to Future Directions. In: IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2013) (December 2013)
Akram, R.N., Markantonakis, K., Mayes, K.: User Centric Security Model for Tamper-Resistant Devices. In: 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). IEEE Computer Society (October 2011)
Petroulakis, N.E., Askoxylakis, I.G., Traganitis, A., Spanoudakis, G.: A privacy-level model of user-centric cyber-physical systems. In: Marinos, L., Askoxylakis, I. (eds.) HAS 2013. LNCS, vol. 8030, pp. 338–347. Springer, Heidelberg (2013)
E-Banking Snapshot 39. Deutsche Bank Research (2012)
Courtois, N.T.: Computer Security at the Low, Hardware/Process/Memory Level. University College London (2009)
Leibholz, S.W., Frankel, C.T.L.: Tracking Inappropriate Data Exfiltration: Dealing with the Ubiquitous Insider Threat via Zero-Knowledge Proof (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Papagrigoriou, P., Plemenos, A., Askoxylakis, I.G. (2014). Discrete Hardware Apparatus and Method for Mobile Application and Communication Security. In: Tryfonas, T., Askoxylakis, I. (eds) Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science, vol 8533. Springer, Cham. https://doi.org/10.1007/978-3-319-07620-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-07620-1_10
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07619-5
Online ISBN: 978-3-319-07620-1
eBook Packages: Computer ScienceComputer Science (R0)