COVID-19 Update: We are currently shipping orders daily. However, due to transit disruptions in some geographies, deliveries may be delayed. To provide all customers with timely access to content, we are offering 50% off Science and Technology Print & eBook bundle options. Terms & conditions.
Mobile Security and Privacy - 1st Edition - ISBN: 9780128046296, 9780128047460

Mobile Security and Privacy

1st Edition

Advances, Challenges and Future Research Directions

Authors: Man Ho Au Raymond Choo
Paperback ISBN: 9780128046296
eBook ISBN: 9780128047460
Imprint: Syngress
Published Date: 13th September 2016
Page Count: 274
Sales tax will be calculated at check-out Price includes VAT/GST
Price includes VAT/GST

Institutional Subscription

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.


Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks.

Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security.

The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges.

Key Features

  • Presents the most current and leading edge research on mobile security and privacy, featuring a panel of top experts in the field
  • Provides a strategic and international overview of the security issues surrounding mobile technologies
  • Covers key technical topics and provides readers with a complete understanding of the most current research findings along with future research directions and challenges
  • Enables practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding the implementation of mobile technology security and privacy initiatives


Mobile security and privacy research communities and practitioner communities. Information Security professionals, legal and compliance professionals, high-level undergrad and post-graduate students as well as government policy makers.

Table of Contents

  • About the Editors
  • Chapter 1: Mobile Security and Privacy
    • Abstract
    • 1 Introduction
    • 2 Threats to Mobile Security
    • 3 Organization of the Book
  • Chapter 2: Mobile Security: A Practitioner’s Perspective
    • Abstract
    • Acknowledgments
    • 1 Mobile Security
    • 2 Principles
    • 3 Application Stores
    • 4 Approved Applications
    • 5 Identity Management Issues
    • 6 Privacy
    • 7 Vulnerabilities
    • 8 Threats
    • 9 Risks
    • 10 Mobile Security Strategy for Organizations that Develop Mobile Applications
    • 11 Mitigations
    • 12 Mobile Security Technical Controls
    • 13 Forensics
    • 14 Summary
    • 15 Mobile Device Security Resources
    • Glossary
    • About the Authors
  • Chapter 3: Mobile Security: End Users are the Weakest Link in the System
    • Abstract
    • 1 Definition: Security “Internetwork”
    • 2 Growth of Smartphone Breaches
    • 3 Organization Internetwork Security
    • 4 Individual Internet Security
    • 5 Conclusion
  • Chapter 4: How Cyber-Savvy are Older Mobile Device Users?
    • Abstract
    • Acknowledgments
    • 1 Introduction
    • 2 Survey Design
    • 3 Findings and Discussion
    • 4 A Situational Crime Prevention Approach
    • 5 Conclusion
  • Chapter 5: The Role of Mobile Devices in Enhancing the Policing System to Improve Efficiency and Effectiveness: A Practitioner’s Perspective
    • Abstract
    • 1 Introduction
    • 2 Interactive Constable on Patrol System
    • 3 Capabilities
    • 4 Conclusion
  • Chapter 6: Supervised Learning Based Detection of Malware on Android
    • Abstract
    • Acknowledgments
    • 1 Permission Background
    • 2 Malware Landscape
    • 3 Machine Learning
    • 4 Characterization and Detection With the Consideration of User Security Specifications
    • 5 Implementation
    • 6 Evaluation and Discussion
    • 7 Conclusion and Perspectives
    • Appendix A Different Combinations of Permissions and Determination of Risks
    • Appendix B Normal Applications for Testing
  • Chapter 7: On Discovering Vulnerabilities in Android Applications
    • Abstract
    • 1 Introduction
    • 2 Background
    • 3 Modeling Common Vulnerabilities
    • 4 Discovering Vulnerabilities
    • 5 Discussion
    • 6 Summary
    • About the Authors
  • Chapter 8: A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps
    • Abstract
    • 1 Introduction
    • 2 An Overview of Android
    • 3 Experiment Setup
    • 4 Findings
    • 5 Conclusion and Future Work
    • Conflict of Interest Declaration
  • Chapter 9: Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone
    • Abstract
    • Acknowledgments
    • 1 Introduction
    • 2 Related Work
    • 3 Digital Evidence in Shanzhai Phone
    • 4 Timeline Analysis of the Digital Evidence
    • 5 Conclusion
  • Chapter 10: RESTful IoT Authentication Protocols
    • Abstract
    • 1 Introduction
    • 2 REST Foundations
    • 3 RESTful IoT Protocols
    • 4 Security for RESTful IoT Protocols
    • 5 REST Message Authentication
    • 6 RESTful IoT Message Authentication
    • 7 Conclusion and Outlook
  • Chapter 11: An Introduction to Various Privacy Models
    • Abstract
    • 1 Introduction
    • 2 Definition of k-Anonymity
    • 3 Mechanisms That Support k-Anonymity
    • 4 Differential Privacy
    • 5 Laplace Mechanism to Achieve Differential Privacy
    • 6 Conclusion
    • About the Authors
  • Chapter 12: Performance of Digital Signature Schemes on Mobile Devices
    • Abstract
    • Acknowledgments
    • 1 Introduction
    • 2 Related Work
    • 3 The Experiment
    • 4 Conclusion
    • About the Authors
  • Index


No. of pages:
© Syngress 2016
13th September 2016
Paperback ISBN:
eBook ISBN:

About the Authors

Man Ho Au

Dr. Man Ho Au is an assistant professor at the Hong Kong Polytechnic University. Before moving to Hong Kong, he has been a lecturer at the School of Computer Science and Software Engineering, University of Wollongong, Australia. His research expertise lies in information security and privacy. He has been an active member in the research community, having served as a program committee member of 15 international conferences in the last five years. He is also the program committee co-chair of the 8th International Conference on Network and System Security. Due to his excellent research track record, he has been appointed as the program committee co-chair of the 9th International Conference on Provable Security, to be held in Japan next year. He is an associate editor of Elsevier’s Journal of Information Security and Applications. He has served as a guest editor for various journals such as Elsevier’s Future Generation Computer Systems and Wiley’s Concurrency and Computation: Practice and Experience.

Despite being an Early Career Researcher, Dr Au has contributed enormously to the research community as shown by his publication and citation records. Since 2009, he has published 18 journal articles, including the well-respected IEEE Transactions on Information Forensics and Security, IEEE Transactions on Knowledge and Data Engineering and the ACM Transaction on Information and System Security and IEEE Transactions on Vehicular Technology. This is in addition to 29 articles accepted by refereed international conferences, including the ACM Conference on Computer and Communications Security (CCS), the top conference in security and privacy research. His research has been recognized internationally, in particular in the area of privacy and accountability. Two of his papers that appeared in the ACM CCS conference were named as “Runners-up for PET Award 2009: Outstanding Research in Privacy Enhancing Technologies”. Au has delivered invited talks in this area in various reputable universities around the world, including Indiana University (USA), Harbin Institute of Technology (China), the University of Electronic Science and Technology (China), Sun Yat-sen University (China), Fujian Normal University (China) and Hong Kong University (Hong Kong). His Google Scholar H-index is 20.

Affiliations and Expertise

Assistant Professor, Hong Kong Polytechnic University

Raymond Choo

Dr Kim-Kwang Raymond Choo is a Fulbright Scholar and Senior Lecturer at the University of South Australia. He has (co)authored a number of publications in the areas of anti-money laundering, cyber and information security, and digital forensics including a book published in Springer’s “Advances in Information Security” book series and six Australian Government Australian Institute of Criminology refereed monographs. He has been an invited speaker for a number of events (e.g. 2011 UNODC-ITU Asia-Pacific Regional Workshop on Fighting Cybercrime and 2011 KANZ Broadband Summit 2011), and delivered Keynote/Plenary Speeches at ECPAT Taiwan 2008 Conference on Criminal Problems and Intervention Strategy, 2010 International Conference on Applied Linguistics and 2011 Economic Crime Asia Conference, and Invited Lecture at the Bangladesh Institute of International and Strategic Studies. He was one of over 20 international (and one of two Australian) experts consulted by the research team preparing McAfee's commissioned report entitled “Virtual Criminology Report 2009: Virtually Here: The Age of Cyber Warfare”; and his opinions on cyber crime and cyber security are regularly published in the media. In 2009, he was named one of 10 Emerging Leaders in the Innovation category of The Weekend Australian Magazine / Microsoft's Next 100 series. He is also the recipient of several awards including the 2010 Australian Capital Territory (ACT) Pearcey Award for “Taking a risk and making a difference in the development of the Australian ICT industry”, 2008 Australia Day Achievement Medallion in recognition of my dedication and contribution to the Australian Institute of Criminology, and through it to the public service of the nation, British Computer Society’s Wilkes Award for the best paper published in the 2007 volume of the Computer Journal, and the Best Student Paper Award by the 2005 Australasian Conference on Information Security and Privacy.

Affiliations and Expertise

Fulbright Scholar and Senior Lecturer, University of South Australia, Research Director, Cloud Security Alliance, Australia Chapter

Ratings and Reviews