Telecommunications Science ›› 2013, Vol. 29 ›› Issue (5): 19-27.doi: 10.3969/j.issn.1000-0801.2013.05.004

• Topic: mobile intelligent terminal technology and application • Previous Articles     Next Articles

Study on the Key Technologies of Smartphone Application Security

Xuan Luo,Baiqing Liang,Junbiao Pan,Yue Huang   

  1. Guangdong Research Institute of China Telecom Co.,Ltd.,Guangzhou 510630,China
  • Online:2013-05-15 Published:2017-06-19

Abstract:

Mobile phone security has become increasingly important in mobile termina1. It is of particular concern as it relates to the security of personal information now stored on smartphones. Some key technologies will be greatly helpful to improve the security level of mobile device,such as the sandbox architecture of the mobile OS,the permission revocation on runtime,the inter-communication between mobile applications and components,and the information-flow tracking. It was aimed to explore and analyze the security key technologies,and showed the future trends of mobile phone security.

Key words: mobile phone security, sandbox, discretionary access contro1, mandatory access contro1, Android, iOS

No Suggested Reading articles found!