Table of Contents

Cover image

Title page

Copyright

Contributors

About the Editors

Chapter 1: Mobile Security and Privacy

Abstract

1 Introduction

2 Threats to Mobile Security

3 Organization of the Book

Chapter 2: Mobile Security: A Practitioner’s Perspective

Abstract

Acknowledgments

1 Mobile Security

2 Principles

3 Application Stores

4 Approved Applications

5 Identity Management Issues

6 Privacy

7 Vulnerabilities

8 Threats

9 Risks

10 Mobile Security Strategy for Organizations that Develop Mobile Applications

11 Mitigations

12 Mobile Security Technical Controls

13 Forensics

14 Summary

15 Mobile Device Security Resources

Glossary

About the Authors

Chapter 3: Mobile Security: End Users are the Weakest Link in the System

Abstract

1 Definition: Security “Internetwork”

2 Growth of Smartphone Breaches

3 Organization Internetwork Security

4 Individual Internet Security

5 Conclusion

Chapter 4: How Cyber-Savvy are Older Mobile Device Users?

Abstract

Acknowledgments

1 Introduction

2 Survey Design

3 Findings and Discussion

4 A Situational Crime Prevention Approach

5 Conclusion

Chapter 5: The Role of Mobile Devices in Enhancing the Policing System to Improve Efficiency and Effectiveness: A Practitioner’s Perspective

Abstract

1 Introduction

2 Interactive Constable on Patrol System

3 Capabilities

4 Conclusion

Chapter 6: Supervised Learning Based Detection of Malware on Android

Abstract

Acknowledgments

1 Permission Background

2 Malware Landscape

3 Machine Learning

4 Characterization and Detection With the Consideration of User Security Specifications

5 Implementation

6 Evaluation and Discussion

7 Conclusion and Perspectives

Appendix A Different Combinations of Permissions and Determination of Risks

Appendix B Normal Applications for Testing

Chapter 7: On Discovering Vulnerabilities in Android Applications

Abstract

1 Introduction

2 Background

3 Modeling Common Vulnerabilities

4 Discovering Vulnerabilities

5 Discussion

6 Summary

About the Authors

Chapter 8: A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps

Abstract

1 Introduction

2 An Overview of Android

3 Experiment Setup

4 Findings

5 Conclusion and Future Work

Conflict of Interest Declaration

Chapter 9: Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone

Abstract

Acknowledgments

1 Introduction

2 Related Work

3 Digital Evidence in Shanzhai Phone

4 Timeline Analysis of the Digital Evidence

5 Conclusion

Chapter 10: RESTful IoT Authentication Protocols

Abstract

1 Introduction

2 REST Foundations

3 RESTful IoT Protocols

4 Security for RESTful IoT Protocols

5 REST Message Authentication

6 RESTful IoT Message Authentication

7 Conclusion and Outlook

Chapter 11: An Introduction to Various Privacy Models

Abstract

1 Introduction

2 Definition of k-Anonymity

3 Mechanisms That Support k-Anonymity

4 Differential Privacy

5 Laplace Mechanism to Achieve Differential Privacy

6 Conclusion

About the Authors

Chapter 12: Performance of Digital Signature Schemes on Mobile Devices

Abstract

Acknowledgments

1 Introduction

2 Related Work

3 The Experiment

4 Conclusion

About the Authors

Index