Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Automated Smartphone Security Configuration

  • Conference paper
Data Privacy Management and Autonomous Spontaneous Security (DPM 2012, SETOP 2012)

Abstract

Smartphones host operating systems that are on a par with modern desktop environments. For example, Google Android is a mobile operating system that is based upon a modified version of the Linux OS. Notwithstanding traditional threats to mobile phones, threats to desktop environments are also applicable to smartphones. Management of security configurations for the end-user has, to date, been complex and error-prone. As a consequence, misconfiguration of and/or a poor understanding of a security configuration may unnecessarily expose a smartphone to known threats. In this paper, a threat-based model for smartphone security configuration is presented. To evaluate the approach, a prototype smartphone security agent that automatically manages security configurations on behalf of the end-user is developed. A case study based on firewall access control demonstrates how automated security configuration recommendations can be made based on catalogues of countermeasures. These countermeasures are drawn from best-practice standards such as NIST 800-124, a guideline on cell phone and PDA security and NIST 800-41-rev1, a guideline on firewall security configuration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. http://www.android.com/

  2. http://www.vodafone.ie/internet-broadband/internet-on-your-mobile/usage/

  3. http://code.google.com/p/droidwall/

  4. http://www.whispersys.com/

  5. Thinking about risk - managing your risk appetite: A practitioner’s guide. HM Treasury on behalf of the Controller of Her Majesty’s Stationery Office (HMSO) (November 2006)

    Google Scholar 

  6. Al-Shaer, E.S., Hamed, H.H., Boutaba, R., Hasan, M.: Conflict Classification and Analysis of Distributed Firewall Policies. IEEE Journal on Selected Areas in Communications 23(10), 2069–2084 (2005)

    Article  Google Scholar 

  7. Balanza, M., Abendan, O., Alintanahin, K., Dizon, J., Caraig, B.: Battery Discharge Characteristics of Wireless Sensor Nodes: An Experimental Analysis. In: 2nd Conference on In Sensor and Ad Hoc Communications and Networks. IEEE (September 2005)

    Google Scholar 

  8. Balanza, M., Abendan, O., Alintanahin, K., Dizon, J., Caraig, B.: DroidDreamLight Lurks Behind Legitimate Android Apps. In: 6th International Conference on Malicious and Unwanted Software (MALWARE) (April 2011)

    Google Scholar 

  9. Buennemeyer, T.K., Gora, M., Marchany, R.C., Tront, J.G.: Battery Exhaustion Attack Detection with Small Handheld Mobile Computers. In: IEEE International Conference on In Portable Information Devices (PORTABLE) (May 2007)

    Google Scholar 

  10. Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: 9th International Conference on Mobile Systems, Applications, and Services (MobiSys), ACM, USA (2011)

    Google Scholar 

  11. Cuppens, F., Cuppens-Boulahia, N., García-Alfaro, J.: Detection and Removal of Firewall Misconfiguration. In: IASTED International Conference on Communication, Network and Information Security (CNIS) (November 2005)

    Google Scholar 

  12. Cuppens, F., Cuppens-Boulahia, N., Sans, T., Miège, A.: A Formal Approach to Specify and Deploy a Network Security Policy. In: 2nd Workshop on Formal Aspects in Security and Trust (FAST) (August 2004)

    Google Scholar 

  13. Foley, S.N., Fitzgerald, W.M.: Management of Security Policy Configuration using a Semantic Threat Graph Approach. Journal of Computer Security (JCS) 19(3) (2011)

    Google Scholar 

  14. Gheorghe, L.: Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and l7-filter. PACKT Publishing (October 2006)

    Google Scholar 

  15. Hernan, S., Lambert, S., Ostwald, T., Shostack, A.: Uncover Security Design Flaws Using The STRIDE Approach, http://microsoft.com/

  16. Jansen, W., Scarfone, K.: Guidelines on Cell Phone and PDA Security: Recommendations of the National Institute of Standards and Technology. NIST-800-124 (2008)

    Google Scholar 

  17. Khadem, S.: Security issues in smartphones and their effects on the telecom networks. MSc Dissertation, Chalmers University of Technology, University of Gothenburg, Sweden (August 2010)

    Google Scholar 

  18. Lyon, G.: NMAP Network Scanning: Official Nmap Project Guide to Network Discovery and Security Scanning. Insecure LLC, CA, United States (2008)

    Google Scholar 

  19. Marmorstein, R., Kearns, P.: A Tool for Automated iptables Firewall Analysis. In: USENIX Annual Technical Conference, Freenix Track, pp. 71–81 (April 2005)

    Google Scholar 

  20. Ruggiero, P., Foote, J.: Cyber threats to mobile phones. TIP-10-105-01, United States Computer Emergency Readiness Team (US-CERT) (April 2010)

    Google Scholar 

  21. Saha, B., Goebel, K.: Modeling Li-ion Battery Capacity Depletion in a Particle Filtering Framework. In: Annual Conference of the Prognostics and Health Management Society, San Diego, CA, USA (September 2009)

    Google Scholar 

  22. Scarfone, K., Hoffman, P.: Guidelines on Firewalls and Firewall Policy: Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800-41, Revision 1 (September 2009)

    Google Scholar 

  23. Scarfone, K., Souppaya, M.: User’s Guide to Securing External Devices for Telework and Remote Access: Recommendations of the National Institute of Standards and Technology. NIST-800-114 (2007)

    Google Scholar 

  24. Schmidt, A.D., Bye, R., Schmidt, H.G., Clausen, J., Kiraz, O., Yüksel, K.A., Camtepe, S.A., Albayrak, S.: Static analysis of executables for collaborative malware detection on android. In: Proceedings of the 2009 IEEE International Conference on Communications, ICC 2009. IEEE Press, Piscataway (2009)

    Google Scholar 

  25. Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google android: A comprehensive security assessment. In: Security and Privacy, vol. 8(2). IEEE Computer Society (March 2010)

    Google Scholar 

  26. Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: “andromaly”: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1) (February 2012)

    Google Scholar 

  27. Shirey, R.: RFC 2828: Internet Security Glossary (May 2000), http://ietf.org

  28. Souppaya, M., Scarfone, K.: Guidelines for Securing Wireless Local Area Networks (WLANs): Recommendations of the National Institute of Standards and Technology. NIST-800-153 (2012)

    Google Scholar 

  29. Suehring, S., Ziegler, R.L.: Linux Firewalls, 3rd edn. Novell Publishing (2006)

    Google Scholar 

  30. Wack, J., Cutler, K., Pole, J.: Guidelines on Firewalls and Firewall Policy: Recommendations of the National Institute of Standards and Technology. NIST-800-41 (2002)

    Google Scholar 

  31. Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It? In: Workshop on Secure Data Management on Smartphones and Mobiles, Washington D.C (April 2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fitzgerald, W.M., Neville, U., Foley, S.N. (2013). Automated Smartphone Security Configuration. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2012 2012. Lecture Notes in Computer Science, vol 7731. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35890-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35890-6_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35889-0

  • Online ISBN: 978-3-642-35890-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics