International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 02 Issue: 09 | Dec-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET ISO 9001:2008 Certified Journal Page 2422
VULNERABILITIES OF SMARTPHONES
Shakuntala P. Kulkarni
1
, Prof Sachin Bojewar
2
1
PG Scholar, Department of Computer Engineering, ARMIET, Maharashtra, India
2
Associate Professor, Department of Information Technology, VIT, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Nowadays, mobile devices are important
part of our lives. Mobile phones allow us to access many
services. Current Smartphones offer capabilities of
traditional personal computers. Other than the
traditional functionality of the phone that is calling,
various other functionalities are provided by phones.
There are different types of connectivity available in
mobile phones such as GSM, GPRS, Bluetooth and Wi-Fi.
Due to these facilities, there is a huge increase in use of
smartphones. As the advantages of smartphone have
increased, there is increase in vulnerabilities of
Smartphone as well. Smartphones are easy targets for
malware writers. As the vulnerabilities increase,
attacks also increase. There are many risks with
smartphones. Phone might contain confidential data
like bank details. It might also have private data like
photos, music, videos etc. If a phone is lost or stolen, all
the data stored in phone will be lost as well as leaked.
Through various applications, smartphone might
unintentionally leak information. Attacker may try to
collect confidential information such as credit card
details, passwords etc. by using fake applications, SMS,
Emails which appears to be genuine. This is known as
phishing attack. Attackers may also use spyware attack
to attack Smartphones. Smartphones may have
spyware application installed, which leaks personal
data of user. There are many types of attacks. To save
oneself from the attacks, and reduce the vulnerabilities,
user must be careful and take few precautions. In this
paper, vulnerabilities of smartphones, the various types
of attacks on smartphones, and measures to be taken to
protect oneself from the attack are discussed in this
paper.
Key Words: Mobile Security, Intrusion Detection,
Mobile Malware, Trusted Mobile.
1. INTRODUCTION
Smartphone is a mobile phone with much functionalities
and features. It has capability as that of personal
computers. Smartphones have features of a phone and has
additional features like a media player, a digital camera,
and/or a GPS navigation unit, web browsing, Wi-Fi, 3rd-
party apps, motion sensor and mobile payment. Due to all
these features, smartphones have become an important
part of the life of the user. As the usage of the smartphones
has increased, there is increasing in vulnerabilities
exploiting these features. Therefore, smartphones are
targets for malware writers. As the vulnerabilities
increase, there is Increase in attacks also. There are few
solutions given by researchers.
In initial days, smartphones came with standard Operating
System (OS). Due to which a single vulnerability led to
attack on large number of smartphones causing major
security outbreaks. Nowadays many operating systems
have come like Symbian OS, Windows Mobile, Android and
iPhone OS. Built-up of each OS is different. If the user
downloads few applications, it is possible that malicious
applications may get installed. Malicious application may
leak personal information of the user.
2. LITERATURE SURVEY
2.1 A Survey on Security for Mobile Devices
Mobile phones are very important part of our everyday
lives. Since, mobile phones come with much functionality;
they are target for many attacks. As the vulnerabilities has
increased, number of attacks also have increased. The
research field dealing with vulnerabilities and attack on
smart phone is still in its starting phase, not explored to
depth and is immature. The attacks are grouped into
different categories based on detection principles, OS etc.
With the categorization it would be easy to find solution to
the treats. [1]
2.2 Survey: Data Protection in Smartphones
against Physical Threats
In this paper a survey is presented of the data protection
of the smartphone against threats like theft or loss of the
smartphone. There is increase of the theft of phone,
because theft of phone is not only a theft of phone, but
theft of bank details, passwords etc. Analysis of the
existing system has revealed that existing system doesn’t
consider user as source of threat. It doesn’t provide
adequate protection against physical threat. It doesn’t take