On the Feasibility of malware attacks in smartphone platforms

Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)


Smartphones are multipurpose devices that host multiple and heterogeneous data. Their user base is constantly increasing and as a result they have become an attractive target for conducting privacy and security attacks. The attacks' impact increases, when smartphone users tend to use their devices both for personal and business purposes. Moreover, application development in smartphone platforms has been simplified, in the platforms developers' effort to attract more developers and increase its popularity by offering more attractive applications. In this paper we provide a comparative evaluation of the security level of well-known smartphone platforms, regarding their protection against simple malicious applications. We then study the feasibility and easiness of smartphone malware development by average programmers via an implementation case study. Our study proved that, under certain circumstances, all examined platforms could be used by average developers as privacy attack vector, harvesting data from the device without the users knowledge and consent.

Original languageEnglish
Title of host publicationE-Business and Telecommunications
Subtitle of host publicationInternational Joint Conference, ICETE 2011 Seville, Spain, July 18-21, 2011 Revised Selected Papers
EditorsJose L. Sevillano, Joaquim Filipe
Number of pages16
Publication statusPublished - 2012
Event8th International Joint Conference on e-Business and Telecommunications, ICETE 2011 - Seville, Spain
Duration: 18 Jul 201121 Jul 2011

Publication series

NameCommunications in Computer and Information Science
ISSN (Print)1865-0929


Conference8th International Joint Conference on e-Business and Telecommunications, ICETE 2011


  • Evaluation Criteria
  • Malware
  • Security Models
  • Smartphone


Dive into the research topics of 'On the Feasibility of malware attacks in smartphone platforms'. Together they form a unique fingerprint.

Cite this