Index
Note: Page numbers followed by f indicates figures and t indicates tables.
A
Advanced persistent threats (APTs)
20
Advanced RISC Machine (ARM)
101
attack vectors/actors
179t
component permissions
175
context-aware security
185
insecure data storage
158
malware threats and countermeasures
176–186
process sandbox mechanism
156
security mechanisms of
156
selective access control
185
App penetration testing
27
Android vulnerabilities
159
Authentication Header (AH) protocols
57–58
Authorization, Android vulnerabilities
159
B
Bilinear Decision Diffie-Hellman (BDDH)
249
Binary-Coded Decimal coding
209–210
Bloomberg Businessweek 61
participants’ responses on
75t
Bring your own device (BYOD)
2,
10,
28,
177
The British Journal for the Philosophy of Science (Puccetti)
6
C
Choose your own device (CYOD)
43
Common vulnerabilities and exposures (CVE)
155–156,
164
Computational Diffie-Hellman (CDH)
249
Conference facility networks
22
Configuration error, Android vulnerabilities
160
Constrained Application Protocol (CoAP)
220–221
Context-aware security
185
Cross-border data theft
45–46
Java Pairing-Based Cryptography Library
249
Custody reference number (CRN)
93
Cybercrime education programs
79
Cybersecurity and Cyberwar, What Everyone Needs To Know (Singer and Friedman)
18
D
Data dependence graph (DDGs)
161
Data mining, privacy-preserving
241,
241f
Dataset, machine learning
109
insecure, Android vulnerabilities
158
Data threats, unintentional disclosure of
24
Denial of service (DoS) threats
20
Discriminating metrics (DM)
119–120
Distributed denial of service (DDoS) threats
20
Drive-by downloads
21,
107
Dynamic analysis-based approaches
162–164
Dynamic behavior analysis
108
E
Electronic eavesdropping
22
Electronic tracking
18–19
Energy consumption measurement testbed
251f
F
G
Geographic information systems (GIS)
95
Global Certainty Penalty (GCP)
240–241
Global Identity Foundation
13
Global Privacy Enforcement Network (GPEN)
16
Google Protection Levels (GPL)
103
H
Hotel facility networks
22
Hypertext Transfer Protocol (HTTP)
219–221
I
Information and communications technology (ICT)
85–86
Information management, ICOPS
89
Insecure data storage, in Android apps
158
Insufficient transport layer protection
158
Integrated Development Environment (IDE)
132
Intelligent personal assistants (IPA)
90–91
Interactive Constable on Patrol System (ICOPS)
86–88
information management
89
intelligent personal assistants
90–91
Inter-Application Communication (IAC)
162
Intercomponent data flow graph (IDFG)
161
International mobile equipment identifier (IMEI)
74
International Telecommunication Union (ITU)
205
Internet-based threats
19–21
Internet of Things (IoT)
66,
217
Internet Protocol (IP)
57–58
Inter-Process Communication (IPC) mechanism
170
J
Java Pairing-Based Cryptography (JPBC) Library
cryptographic settings
249
experiment results and observations
251–252
Joint Test Action Group (JTAG)
206–207
K
released and external data
237f
Knowledge exchange, ICOPS
89
L
Laplace distribution, differential privacy
242–243,
243f
comparison between layer models
137
Location-based social network (LBSN)
235
Long-term evolution (LTE) technology
92
Lost/stolen mobile devices
23
M
combinations of permissions
114–115
Memory Management Unit (MMU)
173
Mobile application management (MAM)
29,
43
Mobile application software developers
8
Mobile Carrier/Network Operator
173
Mobile device end-users
7
Mobile device management (MDM)
7,
28–29
device registration/user enrolment
42
Mobile Industry Review
59
app containerization
10–11
application management
43
cross-border data theft
45–46
identity management issues
12–13
internet-based threats
19–21
network level threats
3,
21–22
software watermarking
11–12
Monitoring settings, mobile device
45
Multidimensional global recording
238–239
N
National Institute of Standards and Technology (NIST)
248–249
Network level threats
3,
21–22
Nongovernmental organizations (NGOs)
62
Nonvolatile random access memory (NVRAM)
207
data items and files stored in
209,
209f
phone book stored in
210f
O
Older people and technology
findings and discussion
70–78
Open Handset Alliance (OHA) consortium
168–169
Operating system (OS), Android
167
Organizational mobile device security
8
P
Pablo Software Virus scan
198
Permission-based Malware Detection System (PMDS)
115–116
incompetent administrators
105
insufficient documentation
105
Personally identifiable information (PII)
16,
72–73,
173
participants’ responses on
76t
participants unaware of
75t
Potentially unwanted programs (PUP)
182
Principle of Least Privilege (PLP)
102,
105
Printed circuit board (PCB)
206–207
Privacy Incorporated: The Business of Trust in the Digital World (Crompton)
15
Privacy-preserving data mining
241,
241f
Push-to-talk communications
92,
92f
Q
R
Random oracle assumption
249
Remote APDU Call Secure (RACS)
requests and responses
223t
Representational state transfer (REST)
217
constraints and principles
218f
RESTful CoAP Message Authentication (RECMA)
229–231
RESTful IoT protocols
220
RESTful Message Authentication (REMA) scheme
226–229,
227b
RESTful RACS Message Authentication (RERMA)
231–233
Risk for mobile devices
24–26
S
Secure software development life cycles (SDLC)
26
architecture of Linux kernel
170–173
representational state transfer
224,
225f
NOR flash memory for
208f
Signature mechanism, Android
156
Situational awareness, ICOPS
95
Small-medium enterprises (SMEs)
62–63
Software watermarking
11–12
Static analysis-based methods
163
Support Vector Machine algorithms
115–116
System validation, applications for
118
T
internet-based threats
19–21
protecting mobile device data
17
Transmission Control Protocol (TCP)
57–58
Two-factor authentication
28
U
Unintended data leakage, Android
159
Unsupervised learning
110
User authentication
27–28
User security specifications
risk and category definitions
121–123
User-supplied pin/passphrase
37
V
Virtual private network (VPN)
38–39
dynamic analysis-based approaches
162–164
insecure data storage
158
insufficient transport layer protection
158
poor authorization and authentication
159
security mechanisms of
156
static analysis-based methods
163
unintended data leakage
159
W
WebView malicious code execution
160
participants’ responses on
75t
Z