Cover Image


"Hardening" Android: Building Security into the Core of Mobile Devices

出版商 Frost & Sullivan 商品編碼 301575
出版日期 內容資訊 英文 28 Pages
商品交期: 最快1-2個工作天內
Back to Top
鞏固Android:建立行動裝置核心安全 "Hardening" Android: Building Security into the Core of Mobile Devices
出版日期: 2014年05月08日 內容資訊: 英文 28 Pages





  • 所謂行動界的威脅
  • Android vs. iOS


  • 由路由和OS的設定,存取替代市場
  • 第三方的應用程式商店
  • 行動的威脅是非不明




  • ARM TrustZone
  • Qualcomm
  • Samsung
  • Intel
  • Boeing
  • Blackphone



Product Code: D565-00-06-00-00

The use cases of mobile devices result in different risk than traditional PCs. The availability of Internet-based application stores provides uniquely mobile conduits for mobile malware, with Android malware being the favored mobile attack vector. Research by the United States Computer Emergency Readiness Team (US-CERT) confirms that the majority of known mobile threats target Android devices.

In this market insight, we will:

  • Provide an overview of mobile security and mobile threats
  • Discuss the unique role of the application stores and what makes Android especially vulnerable
  • Review good mobile security hygiene
  • Discuss how hardware technology can be leveraged to improve Android security
  • Elaborate on how some companies are leading innovation by using hardware technology to improve Android security

Table of Contents


Overview of Mobile Security

  • What is a Threat in the Mobile World?
  • Contrasting Android and iOS

Android Application Stores

  • Rooting and OS Settings to Access Alternative Market
  • Third Party App Stores
  • When Mobile Threats Are Not Black and White

Good Security Hygiene Practices for Android

Leveraging Hardware Technology to Improve Android Security

  • The Foundation of Security-A Root of Trust
    • Mobile Challenges with Roots of Trust
    • Roots of Trust in Android

Companies Leading Innovation

  • ARM TrustZone
  • Qualcomm
    • SecureMSM
    • StudioAccess Technology
    • Enterprise and BYOD security
  • Samsung
    • Device & Data Security
    • Container Usability
    • Easy Enrollment
    • Cloud-based Mobile Device Control
    • Centrify for Samsung KNOX
  • Intel
    • Intel Identity Protection Technology (IPT)
    • Intel Device Protection Technology (DPT) for Android
  • Boeing
  • Blackphone

The Last Word

List of Figures

  • Figure 1: F-Secure Labs Mobile Threat Classifications
  • Figure 2: Mobile Vulnerabilities by Year (2011-2013)
  • Figure 3: Risk Posture of the Google Play Store
  • Figure 4: Analysis of the Malware Content of Android App Store
  • Figure 5: Mobile Malware Types Common to Sideloading Practices
  • Figure 6: Example Request for Android Application Permissions
  • Figure 7: Changing Face of Mobile Threat Vectors; Malvertising Overtakes Porn
  • Figure 8: ARM TrustZone Environments
  • Figure 9: Attributes and Benefits of TrustZone
  • Figure 10: Intel IPT Example
  • Figure 11: Intel Device Protection Technology Features and Benefits
  • Figure 12: Intel DPT Secure Containerization
  • Figure 13: The Boeing Black Smartphone
Back to Top