International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 09 | Dec-2015 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 2422 VULNERABILITIES OF SMARTPHONES Shakuntala P. Kulkarni 1 , Prof Sachin Bojewar 2 1 PG Scholar, Department of Computer Engineering, ARMIET, Maharashtra, India 2 Associate Professor, Department of Information Technology, VIT, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Nowadays, mobile devices are important part of our lives. Mobile phones allow us to access many services. Current Smartphones offer capabilities of traditional personal computers. Other than the traditional functionality of the phone that is calling, various other functionalities are provided by phones. There are different types of connectivity available in mobile phones such as GSM, GPRS, Bluetooth and Wi-Fi. Due to these facilities, there is a huge increase in use of smartphones. As the advantages of smartphone have increased, there is increase in vulnerabilities of Smartphone as well. Smartphones are easy targets for malware writers. As the vulnerabilities increase, attacks also increase. There are many risks with smartphones. Phone might contain confidential data like bank details. It might also have private data like photos, music, videos etc. If a phone is lost or stolen, all the data stored in phone will be lost as well as leaked. Through various applications, smartphone might unintentionally leak information. Attacker may try to collect confidential information such as credit card details, passwords etc. by using fake applications, SMS, Emails which appears to be genuine. This is known as phishing attack. Attackers may also use spyware attack to attack Smartphones. Smartphones may have spyware application installed, which leaks personal data of user. There are many types of attacks. To save oneself from the attacks, and reduce the vulnerabilities, user must be careful and take few precautions. In this paper, vulnerabilities of smartphones, the various types of attacks on smartphones, and measures to be taken to protect oneself from the attack are discussed in this paper. Key Words: Mobile Security, Intrusion Detection, Mobile Malware, Trusted Mobile. 1. INTRODUCTION Smartphone is a mobile phone with much functionalities and features. It has capability as that of personal computers. Smartphones have features of a phone and has additional features like a media player, a digital camera, and/or a GPS navigation unit, web browsing, Wi-Fi, 3rd- party apps, motion sensor and mobile payment. Due to all these features, smartphones have become an important part of the life of the user. As the usage of the smartphones has increased, there is increasing in vulnerabilities exploiting these features. Therefore, smartphones are targets for malware writers. As the vulnerabilities increase, there is Increase in attacks also. There are few solutions given by researchers. In initial days, smartphones came with standard Operating System (OS). Due to which a single vulnerability led to attack on large number of smartphones causing major security outbreaks. Nowadays many operating systems have come like Symbian OS, Windows Mobile, Android and iPhone OS. Built-up of each OS is different. If the user downloads few applications, it is possible that malicious applications may get installed. Malicious application may leak personal information of the user. 2. LITERATURE SURVEY 2.1 A Survey on Security for Mobile Devices Mobile phones are very important part of our everyday lives. Since, mobile phones come with much functionality; they are target for many attacks. As the vulnerabilities has increased, number of attacks also have increased. The research field dealing with vulnerabilities and attack on smart phone is still in its starting phase, not explored to depth and is immature. The attacks are grouped into different categories based on detection principles, OS etc. With the categorization it would be easy to find solution to the treats. [1] 2.2 Survey: Data Protection in Smartphones against Physical Threats In this paper a survey is presented of the data protection of the smartphone against threats like theft or loss of the smartphone. There is increase of the theft of phone, because theft of phone is not only a theft of phone, but theft of bank details, passwords etc. Analysis of the existing system has revealed that existing system doesn’t consider user as source of threat. It doesn’t provide adequate protection against physical threat. It doesn’t take