Security Methods Against Potential Physical Attacks on Smartphones

The rapid growth in communications development has made devices intelligent, efficient and convenient to accomplish many of our daily tasks, where they became an integral part of our lives. On the other hand, this growth has led to an expansion in the percentage of security risks and threats to the network devices and their data. Therefore, in this paper, we present a comprehensive study of the proposed solutions to protect smartphones from two of the physical security attacks which are commercial fraud and lost or theft. In addition, we discuss these two physical security attacks and provides several statistics related to them.

[1]  Neng Gao,et al.  Remotely wiping sensitive data on stolen smartphones , 2014, AsiaCCS.

[2]  Sebastian Möller,et al.  Psychological needs as motivators for security and privacy actions on smartphones , 2017, J. Inf. Secur. Appl..

[3]  Graham Farrell Preventing phone theft and robbery: the need for government action and international coordination , 2015 .

[4]  Ni Zhang,et al.  A Survey on Smartphone Security , 2013 .

[5]  Abhishek Tiwari,et al.  ThiefTrap - An Anti-theft Framework for Android , 2017, SecureComm.

[6]  Xin Meng,et al.  iGuard: A Real-Time Anti-Theft System for Smartphones , 2018, IEEE Transactions on Mobile Computing.

[7]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[8]  Jie Wu,et al.  SafeCode - Safeguarding Security and Privacy of User Data on Stolen iOS Devices , 2012, CSS.

[9]  Serge Egelman,et al.  Detecting Phone Theft Using Machine Learning , 2018 .

[10]  Wendy Middlemiss,et al.  Impact of parents mobile device use on parent-child interaction: A literature review , 2017, Comput. Hum. Behav..

[11]  Janina da Costa Cruz,et al.  Chaining Property to Blocks - On the Economic Efficiency of Blockchain-Based Property Enforcement , 2018, BIS.

[12]  Shan Chang,et al.  SmartDog: Real-Time Detection of Smartphone Theft , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[13]  Tuomas Aura,et al.  Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[14]  V. Joseph Raymond,et al.  Google drive based secured anti-theft android application , 2017, 2017 International Conference on IoT and Application (ICIOT).

[15]  Prabhpreet Kaur,et al.  Vulnerability Detection of International Mobile Equipment Identity Number of Smartphone and Automated Reporting of Changed IMEI Number , 2015 .

[16]  Gerald Q. Maguire,et al.  An Architecture To Provide Cloud Based Security Services For Smartphones , 2011 .

[17]  Laurent Simon,et al.  Security Analysis of Consumer-Grade Anti-Theft Solutions Provided by Android Mobile Anti-Virus , 2015 .