Georgia Tech forecasts cyber threats for 2012.
“Mobile applications are increasingly reliant on the browser,” said Patrick Traynor, GTISC researcher and assistant professor at the Georgia Tech School of Computer Science. “As a result, we expect more Web-based attacks against mobile devices to be launched in the coming year.”
Tension between usability and security, along with device constraints make it difficult to solve mobile Web browser security flaws. “The mobile vector requires special consideration when it comes to security,” said Traynor. “We still need to explore the significant differences between mobile browsers and traditional desktop browsers to fully understand the potential of emerging threats.”
- Traynor cites small screen size as just one of many device-related challenges to mobile security. To enhance usability, the address bar disappears above the screen so that more of the page content can be displayed. But this also removes many of the visual cues users rely on to confirm the safety of their online location. If a user does click a malicious link on a mobile device, it becomes easier to obfuscate the attack since the Web address bar is not visible.
- The varied existence of SSL icons on mobile browsers can also contribute to successful exploitation. “If you’re a security expert and you want to see the SSL certificates for a site from your mobile phone browser, it is extremely difficult to find that information — if it’s there at all,” said Traynor. “And if a security expert can’t verify a connection and a certificate, how do we expect the average user to avoid compromise?”
- Understandably, display security on mobile browsers is not as advanced as the desktop either. The way elements are laid out on a page and the actions that take place when a user touches something are all opportunities to embed an attack