How secure are current mobile operating systems?

2Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

There are numerous initiatives to use mobile devices as so-called "trusted pocket signers" to produce electronic signatures. The actual signature is generated by means of a conventional signature card. The mobile device serves as the card reader, storage device for the document to be signed and as a display for the signature application. The operating system used on the mobile device has thus a pivotal importance to ensure the integrity and accountability of the electronic signature. Also mobile devices are used to provide mobile workers with access to the corporate backend. We examined the currently available mobile operating systems in regard to their security and conclude that not a single one is secure enough for "trusted" signing and only partially for secure backend access. We show two possible ways of how to make mobile devices more secure and possibly to enable something close to "what you see is what you sign". © 2005 by International Federation for Information Processing.

Cite

CITATION STYLE

APA

Murmann, T., & Rossnagel, H. (2005). How secure are current mobile operating systems? In IFIP Advances in Information and Communication Technology (Vol. 175, pp. 47–58). Springer New York LLC. https://doi.org/10.1007/0-387-24486-7_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free