ABSTRACT

This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment.

part |2 pages

SECTION I: AUTHENTICATION TECHNIQUES FOR MOBILE DEVICES

chapter 1|26 pages

Exploring Mobile Authentication Mechanisms from Personal Identification Numbers to Biometrics Including the Future Trend

ByFLORENTIN THULLIER, BRUNO BOUCHARD, AND BOB-ANTOINE J. MÉNÉLAS

chapter 3|16 pages

Visual Authentication Based on Visual Cryptography Using Mobile Devices . . . . . . . . . ARI MOESRIAMI BARMAWI

ByYANG-WAI CHOW, WILLY SUSILO, MAN HO AU, AND

part |2 pages

SECTION II: MOBILE DEVICE PRIVACY

chapter 4|26 pages

Dealing with User Privacy in Mobile Apps: Issues and Mitigation

ByRICARDO NEISSE, DIMITRIS GENEIATAKIS, GARY STERI, GEORGIOS KAMBOURAKIS, IGOR NAI FOVINO, AND RICCARDO SATTA

chapter 5|28 pages

An Empirical Study on Android for Saving Nonshared Data on Public Storage . . . . . . KEHUAN ZHANG

ByXIANGYU LIU, ZHE ZHOU, WENRUI DIAO, ZHOU LI

part |2 pages

SECTION III: MOBILE OPERATING SYSTEM VULNERABILITIES

part |2 pages

SECTION IV: MALWARE CLASSIFICATION AND DETECTION

chapter 8|28 pages

Efficient Classification of Android Malware in the Wild Using Robust Static Features

ByHOSSEIN FEREIDOONI, VEELASHA MOONSAMY, MAURO CONTI, LEJLA BATINA

chapter 9|24 pages

An Empirical Analysis of Android Banking Malware

ByANDI FITRIAH A. KADIR, NATALIA STAKHANOVA, AND ALI A. GHORBANI

part |2 pages

SECTION V: MOBILE NETWORK SECURITY

chapter 10|26 pages

Physical Layer Security in the Last Mile Technology of Mobile Networks

ByÖZGE CEPHELI, VOLKER LÜCKEN, GÜNES¸ KARABULUT KURT,

chapter 11|30 pages

Protecting Mobile Payments Security: A Case Study

ByBO XING