Smartphone security limitations: conflicting traditions

  • Authors:
  • Nathaniel Husted;Hassen Saïdi;Ashish Gehani

  • Affiliations:
  • Indiana University, Bloomington;Computer Science Labratory, SRI International, Menlo Park;Computer Science Labratory, SRI International, Menlo Park

  • Venue:
  • Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Smartphones are becoming a dominant form of mobile computing in the United States, and more slowly, the world. The smartphone, as a platform, blends a traditional general computing platform with a specialized mobile phone platform. However, each platform comes with its own tradition of social practices and policies. The general computing tradition is historically open, allowing its owners, i.e., users and administrators, to install whatever software they choose, and to add or remove hardware as they please. The cellular tradition has historically been very tightly controlled and locked down since telecommunications networks are considered critical national infrastructure. These two competing ideals clash on the smartphone platform and this clash is exemplified by Android OS platform created by Google. The Android platform attempts to be "open" while conforming to the traditional policies of mobile phones. The conflict in philosophies between general computing platforms and mobile phones have led to fundamental limitations in the platform security of the phone. Our paper looks at these fundamental limitations and how they relate to the challenge of reconciling governance practices in use on general purpose computers and mobile phones. We also provide certain policy guidelines and platform architecture suggestions that will help create a more secure smartphone platform.