{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T00:19:10Z","timestamp":1768090750129,"version":"3.49.0"},"reference-count":101,"publisher":"IEEE","license":[{"start":{"date-parts":[[2011,5,1]],"date-time":"2011-05-01T00:00:00Z","timestamp":1304208000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2011,5,1]],"date-time":"2011-05-01T00:00:00Z","timestamp":1304208000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/sp.2011.29","type":"proceedings-article","created":{"date-parts":[[2011,7,21]],"date-time":"2011-07-21T11:19:20Z","timestamp":1311247160000},"page":"96-111","source":"Crossref","is-referenced-by-count":98,"title":["Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices"],"prefix":"10.1109","author":[{"given":"Michael","family":"Becher","sequence":"first","affiliation":[{"name":"Univ. of Mannheim, Mannheim, Germany"}]},{"given":"Felix C.","family":"Freiling","sequence":"additional","affiliation":[{"name":"Univ. of Mannheim, Mannheim, Germany"}]},{"given":"Johannes","family":"Hoffmann","sequence":"additional","affiliation":[{"name":"Horst Gortz Inst. (HGI), Ruhr-Univ. Bochum, Bochum, Germany"}]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"Horst Gortz Inst. (HGI), Ruhr-Univ. Bochum, Bochum, Germany"}]},{"given":"Sebastian","family":"Uellenbeck","sequence":"additional","affiliation":[{"name":"Horst Gortz Inst. (HGI), Ruhr-Univ. Bochum, Bochum, Germany"}]},{"given":"Christopher","family":"Wolf","sequence":"additional","affiliation":[{"name":"Horst Gortz Inst. (HGI), Ruhr-Univ. Bochum, Bochum, Germany"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Security Mechanisms in UMTS","volume":"25","author":"p\u00fctz","year":"2001","journal-title":"Datenschutz und Datensicherheit"},{"key":"ref38","article-title":"Comprehensive Analysis of UMTS Authentication and Key Agreement","volume":"2","author":"hassan","year":"2010","journal-title":"International Journal of Computer and Network Security"},{"key":"ref33","article-title":"Exploiting Open Functionality in SMS-capable Cellular Networks","author":"enck","year":"0","journal-title":"ACM Conference on Computer and Communications Security (CCS)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_24"},{"key":"ref31","article-title":"GSM. Simplified","year":"0"},{"key":"ref30","article-title":"OpenBSC","year":"0"},{"key":"ref37","article-title":"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G security; Security principles and objectives (Release 4)","year":"2001","journal-title":"3rd Generation Partnership Project (3GPP) Tech Rep"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359550"},{"key":"ref35","article-title":"Mitigating Attacks on Open Functionality in SMS-capable Cellular Networks","volume":"17","author":"traynor","year":"2009","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161304"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9001-y"},{"key":"ref27","article-title":"Reconstructing people's lives: A case study in teaching forensic computing","author":"freiling","year":"0","journal-title":"Conference on IT-Incident Management & IT-Forensics"},{"key":"ref29","article-title":"Method for identifying a mobile phone user or for eavesdropping on outgoing calls","author":"frick","year":"0"},{"key":"ref20","article-title":"Mobile Application Security - Requirements for Mobile Applications Signing Schemes - Version 1.23","year":"2006"},{"key":"ref22","article-title":"Turbo SIM","year":"0"},{"key":"ref21","article-title":"Security of smartphones at the dawn of their ubiquitousness","author":"becher","year":"2009","journal-title":"Ph D Dissertation"},{"key":"ref24","article-title":"SIMtrace","year":"0"},{"key":"ref23","article-title":"Turbo SIM add-on allows full iPhone unlocking","author":"berka","year":"2007"},{"key":"ref26","first-page":"2008","article-title":"Disk Study 2008&#x2013;2009","year":"2009"},{"key":"ref101","author":"shneiderman","year":"2004","journal-title":"Designing the User Interface Strategies for Effective Human-Computer Interaction"},{"key":"ref25","article-title":"Advanced Trusted Environment - OMTP TRl","year":"2008"},{"key":"ref100","article-title":"Ten Usability Heuristics","author":"nielsen","year":"2005"},{"key":"ref50","article-title":"Bluetooth-Worm:SymbOS\/Cabir","year":"0","journal-title":"F-secure"},{"key":"ref51","article-title":"Androi-dOS.Tapsnake: Watching Your Every Move","year":"2010"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14215-4_4"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1882486.1882493"},{"key":"ref57","article-title":"First SMS Trojan Detected for Smart-phones running Android","year":"2010"},{"key":"ref56","article-title":"Learning More About the Underground Economy: a Case-Study of Keyloggers and Dropzones","author":"holz","year":"0","journal-title":"European Conference on Research in Computer Security (ESORICS)"},{"key":"ref55","article-title":"The Underground Economy: Priceless","volume":"31","author":"thomas","year":"2006","journal-title":"USENIX login"},{"key":"ref54","article-title":"An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants","author":"franklin","year":"0","journal-title":"ACM Conference on Computer and Communications Security (CCS)"},{"key":"ref53","article-title":"Soundminer: A Stealthy and Context-Aware Sound Trojan for Smartphones","author":"schlegel","year":"2011","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"ref52","article-title":"SpyPhone","author":"seriot","year":"2010"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023662"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.134"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.21"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1038\/449287a","article-title":"The Wireless Epidemic","volume":"449","author":"kleinberg","year":"2007","journal-title":"Nature"},{"key":"ref5","article-title":"State of Cell Phone Malware in 2007","author":"hypponen","year":"2007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734595"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.159"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0021-1"},{"key":"ref9","article-title":"Major Smartphone Worm &#x2018;by 2007&#x2019;","author":"kotadia","year":"2005"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.62"},{"key":"ref45","article-title":"Leaking crypto keys from mobile devices","author":"mills","year":"2009"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653690"},{"key":"ref47","article-title":"Paris Hilton Hack Started With Old-Fashioned Con","author":"krebs","year":"2005"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062173"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.05.008"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004360"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential Power Analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"CRYPTO Ser Lecture Notes in Computer Science"},{"key":"ref73","article-title":"Mobile Security Report","year":"2008"},{"key":"ref72","article-title":"SymbOS Malware Classification Problems","author":"bontchev","year":"2006","journal-title":"Virus Bulletin Conference"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0022-0"},{"key":"ref70","doi-asserted-by":"crossref","DOI":"10.3139\/9783446407589","author":"eren","year":"2006","journal-title":"Mobile Security"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403024"},{"key":"ref77","article-title":"How a IS-yo Kid Tricked Apple With a Disguised iPhone Tethering App","author":"diaz","year":"2010"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/1622103.1629656"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199486"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247690"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"key":"ref60","article-title":"Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets","author":"zeng","year":"2010","journal-title":"Tech Rep CSE-TR-562-10"},{"key":"ref62","article-title":"Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks","author":"freiling","year":"0","journal-title":"European Conference on Research in Computer Security (ESORICS)"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177086"},{"key":"ref63","article-title":"Siemens M Series SMS DoS Vulnerability","year":"2003"},{"key":"ref64","article-title":"Remote SMS\/MMS Denial of Service - &#x201C;Curse Of Silence&#x201D; for Nokia S60 phones","author":"engel","year":"2008"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.55"},{"key":"ref66","article-title":"Browser","year":"2007"},{"key":"ref67","article-title":"Denial of Service for Internet Explorer on Windows Mobile 5.0 and Windows Mobile 2003 and 2003SE for Smartphones and PocketPC","year":"2007"},{"key":"ref68","article-title":"PDA Attacks, Part 2: Airborne Viruses &#x2013; Evolution of the Latest Threats","volume":"4","author":"peikari","year":"2005","journal-title":"(In)secure Magazine"},{"key":"ref69","article-title":"An Overview of Mobile Device Security","author":"shevchenko","year":"2005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/357489.357516"},{"key":"ref1","article-title":"Malicious Code Moves to Mobile Devices","volume":"33","author":"leavitt","year":"2000","journal-title":"IEEE Computer"},{"key":"ref95","article-title":"Design Principles and Patterns for Computer Systems that are Simultaneously Secure and Usable","author":"garfinkel","year":"2005","journal-title":"Ph D Dissertation"},{"key":"ref94","author":"cranor","year":"2005","journal-title":"Security and Usability Designing Secure Systems that People Can Use"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.12.004"},{"key":"ref92","article-title":"Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0","author":"whitten","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref91","article-title":"iPhish: Phishing Vulnerabilities on Consumer Electronics","author":"niu","year":"0","journal-title":"Proc USENIX Workshop Usability Psychology and Security (UPSEC)"},{"key":"ref90","article-title":"PiOS: Detecting Privacy Leaks in iOS Applications","author":"egele","year":"2011","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.134"},{"key":"ref99","article-title":"The Myth of User Education","author":"g\u00f6rling","year":"2006","journal-title":"Virus Bulletin Conference"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.04.003"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2007.06.003"},{"key":"ref10","article-title":"Virusability of Modern Mobile Environments","author":"bontchev","year":"2007","journal-title":"Virus Bulletin Conference"},{"key":"ref11","article-title":"Gartner Says Worldwide Mobile Phone Sales Grew 35 Percent in Third Quarter 2010; Smartphone Sales Increased 96 Percent","year":"2010"},{"key":"ref12","article-title":"Pwn20wn2010","author":"portnoy","year":"2010"},{"key":"ref13","article-title":"Android 2.0&#x2013;2.1 Reverse Shell Exploit","author":"keith","year":"2010"},{"key":"ref14","article-title":"All Your Baseband Are Belong To Us","author":"weinmann","year":"2010","journal-title":"Hack lu"},{"key":"ref15","article-title":"Google pulls app that revealed Android flaw, issues fix","author":"greenberg","year":"2010"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MDSO.2006.22"},{"key":"ref82","article-title":"This is not the Droid you're looking for &#x2026;","author":"percoco","year":"2010","journal-title":"DEFCON 18"},{"key":"ref17","author":"guthery","year":"2003","journal-title":"Developing MMS Applications - Multimedia Messaging Services for Wireless Networks"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378627"},{"key":"ref18","article-title":"ZeuS Mitmo: Man-in-the-mobile","author":"barroso","year":"2010"},{"key":"ref84","article-title":"Retroactive Detection of Malware With Applications to Mobile Platforms","author":"jakobsson","year":"0","journal-title":"USENIX Workshop on Hot Topics in Security (HotSec)"},{"key":"ref19","article-title":"Advanced Device Management","year":"2008"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734596"},{"key":"ref80","article-title":"VirusMeter: Preventing Your Cellphone from Spies","author":"liu","year":"0","journal-title":"International Symposium on Recent Advances in Intrusion Detection (RAID)"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.4.10.968-975"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"key":"ref88","article-title":"SCanDroid: Automated Security Certification of Android Applications","author":"fuchs","year":"2010"}],"event":{"name":"2011 IEEE Symposium on Security and Privacy (SP)","location":"Oakland, CA, USA","start":{"date-parts":[[2011,5,22]]},"end":{"date-parts":[[2011,5,25]]}},"container-title":["2011 IEEE Symposium on Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5955408\/5958008\/05958024.pdf?arnumber=5958024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T17:52:59Z","timestamp":1758822779000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5958024\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":101,"URL":"https:\/\/doi.org\/10.1109\/sp.2011.29","relation":{},"subject":[],"published":{"date-parts":[[2011,5]]}}}