Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

Author:

Muhammad Zia1ORCID,Anwar Zahid1ORCID,Javed Abdul Rehman2ORCID,Saleem Bilal3,Abbas Sidra4ORCID,Gadekallu Thippa Reddy25678ORCID

Affiliation:

1. Department of Computer Science and the Challey Institute, North Dakota State University, Fargo, ND 6050, USA

2. Department of Electrical and Computer Engineering, Lebanese American University, Byblos 36/S-12, Lebanon

3. Department of Cybersecurity, Air University, E-9, Islamabad 44000, Pakistan

4. Department of Computer Science, COMSATS University, Islamabad 44000, Pakistan

5. Zhongda Group, Haiyan County, Jiaxing 314312, China

6. School of Information Technology and Engineering, Vellore Institute of Technology, Tamil Nadu 632 014, India

7. College of Information Science and Engineering, Jiaxing University, Jiaxing 314001, China

8. Division of Research and Development, Lovely Professional University, Phagwara 144411, India

Abstract

There is an exponential rise in the use of smartphones in government and private institutions due to business dependencies such as communication, virtual meetings, and access to global information. These smartphones are an attractive target for cybercriminals and are one of the leading causes of cyber espionage and sabotage. A large number of sophisticated malware attacks as well as advanced persistent threats (APTs) have been launched on smartphone users. These attacks are becoming significantly more complex, sophisticated, persistent, and undetected for extended periods. Traditionally, devices are targeted by exploiting a vulnerability in the operating system (OS) or device sensors. Nevertheless, there is a rise in APTs, side-channel attacks, sensor-based attacks, and attacks launched through the Google Play Store. Previous research contributions have lacked contemporary threats, and some have proven ineffective against the latest variants of the mobile operating system. In this paper, we conducted an extensive survey of papers over the last 15 years (2009–2023), covering vulnerabilities, contemporary threats, and corresponding defenses. The research highlights APTs, classifies malware variants, defines how sensors are exploited, visualizes multiple ways that side-channel attacks are launched, and provides a comprehensive list of malware families that spread through the Google Play Store. In addition, the research provides details on threat defense solutions, such as malware detection tools and techniques presented in the last decade. Finally, it highlights open issues and identifies the research gap that needs to be addressed to meet the challenges of next-generation smartphones.

Funder

Sheila and Robert Challey Institute for Global Innovation and Growth, North Dakota State University (NDSU), USA

Publisher

MDPI AG

Subject

Computer Science (miscellaneous)

Reference267 articles.

1. Use of smartphone apps for mobile communication and social digital pressure: A longitudinal panel study;Herrero;Technol. Forecast. Soc. Chang.,2023

2. Federated learning for internet of things: Recent advances, taxonomy, and open challenges;Khan;IEEE Commun. Surv. Tutor.,2021

3. Kaur, P., and Arora, K. (2022). Industrial Internet of Things, CRC Press.

4. Preference of Mobile Platforms: A Study of Ios vs. Android;Toppo;Int. J. Mod. Agric.,2021

5. Analytica, O. Huawei’s Harmony may challenge Android-Apple duopoly. Emerald Expert Briefings, 2021.

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Topological Data Analysis for Robust Gait Biometrics Based on Wearable Sensors;IEEE Transactions on Consumer Electronics;2024-05

2. Analysis of SQL injection attacks in the cloud and in WEB applications;SECURITY AND PRIVACY;2024-01-18

3. Securing the Digital Supply Chain Cyber Threats and Vulnerabilities;Advances in Logistics, Operations, and Management Science;2023-12-29

4. Survey on Blockchain-Based Data Storage Security for Android Mobile Applications;Sensors;2023-10-26

5. Smart Cities: A Novel Framework for Energy Production and Harvesting using Renewable Energy;2023 International Conference on IT and Industrial Technologies (ICIT);2023-10-09

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3