메뉴 건너뛰기




Volumn 16, Issue 1, 2016, Pages 73-111

Android mobile VoIP apps: a survey and examination of their security and privacy

Author keywords

Android applications; Mobile VoIP (mVoIP) applications; Security and privacy of mobile VoIP apps; Voice over Internet Protocol (VoIP)

Indexed keywords

ANDROID (OPERATING SYSTEM); INTERNET PROTOCOLS; INTERNET TELEPHONY; MOBILE SECURITY; SURVEYS; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 84958034911     PISSN: 13895753     EISSN: 15729362     Source Type: Journal    
DOI: 10.1007/s10660-015-9208-1     Document Type: Article
Times cited : (38)

References (51)
  • 1
    • 84958083286 scopus 로고    scopus 로고
    • Viber communication security, Unscramble the scrambled
    • Appelman, M., Bosma, J., & Veerman, G. (2011). Viber communication security: Unscramble the scrambled.
    • (2011) & Veerman, G
    • Appelman, M.1    Bosma, J.2
  • 2
    • 84958083287 scopus 로고    scopus 로고
    • Australian Government Department of Broadband Communications and Digital Economy. (2013). Statistical Snapshot
    • Australian Government Department of Broadband Communications and Digital Economy. (2013). Statistical Snapshot.
  • 3
    • 84877261395 scopus 로고    scopus 로고
    • Azab, A., Watters, P., & Layton, R. (2012). Characterising network traffic for skype forensics. In Proceedings of the Third Cybercrime and Trustworthy Computing Workshop (CTC), Australia, 29–30 October 2012 (pp. 19–27)
    • Azab, A., Watters, P., & Layton, R. (2012). Characterising network traffic for skype forensics. In Proceedings of theThird Cybercrime and Trustworthy Computing Workshop (CTC), Australia, 29–30 October 2012 (pp. 19–27).
  • 4
    • 84902262572 scopus 로고    scopus 로고
    • A study of ten popular android mobile voip applications: Are the communications encrypted? In Proceedings of the 47th Anual Hawaii International Conference on System Sciences (HICSS)
    • Azfar, A., Choo, K.-K. R., & Liu, L. (2014). A study of ten popular android mobile voip applications: Are the communications encrypted? In Proceedings of the 47th Anual Hawaii International Conference on System Sciences (HICSS), Hawaii, 6–9 January 2014 (pp. 4858–4867).
    • (2014) Hawaii, 6–9 January , vol.2014 , pp. 4858-4867
    • Azfar, A.1    Choo, K.-K.R.2    Liu, L.3
  • 5
    • 84958083289 scopus 로고    scopus 로고
    • Critical flaw in Viber allows full access to Android Smartphones, bypassing lock screen. Accessed April 30, 2013
    • BKAV Internet Security Corporation (2013). Critical flaw in Viber allows full access to Android Smartphones, bypassing lock screen. Accessed April 30, 2013, from http://www.bkav.com/top-news/-/view_content/content/46264/critical-flaw-in-viber-allows-full-access-to-android-smartphones-bypassing-lock-screen.
    • (2013) from
    • Internet Security Corporation, B.K.A.V.1
  • 6
    • 83055174716 scopus 로고    scopus 로고
    • Blond, S. L., Zhang, C., Legout, A., Ross, K., & Dabbous, W. (2011). I know where you are and what you are sharing: exploiting P2P communications to invade users’ privacy. In Proceedings of the ACM Internet Measurement Conference (SIGCOMM 2011), Germany, 2–4 November 2011 (pp. 45–60)
    • Blond, S. L., Zhang, C., Legout, A., Ross, K., & Dabbous, W. (2011). I know where you are and what you are sharing: exploiting P2P communications to invade users’ privacy. In Proceedings of theACM Internet Measurement Conference (SIGCOMM 2011), Germany, 2–4 November 2011 (pp. 45–60).
  • 7
    • 65049084187 scopus 로고    scopus 로고
    • Beyond e-business models: The road to virtual worlds
    • Cagnina, M., & Poian, M. (2009). Beyond e-business models: The road to virtual worlds. Electronic Commerce Research,9(1–2), 49–75.
    • (2009) Electronic Commerce Research , vol.9 , Issue.1-2 , pp. 49-75
    • Cagnina, M.1    Poian, M.2
  • 8
    • 84958083291 scopus 로고    scopus 로고
    • Wright, J: Advanced metering infrastructure attack methodology
    • Carpenter, M., & Wright, J. (2009). Advanced metering infrastructure attack methodology. http://inguardians.com/pubs/AMI_Attack_Methodology.pdf.
    • (2009)
    • Carpenter, M.1
  • 9
    • 84886298305 scopus 로고    scopus 로고
    • The security service rating design for IT convergence services
    • Chang, H. (2013). The security service rating design for IT convergence services. Electronic Commerce Research,13(3), 317–328.
    • (2013) Electronic Commerce Research , vol.13 , Issue.3 , pp. 317-328
    • Chang, H.1
  • 11
    • 36248972280 scopus 로고    scopus 로고
    • Investigating antecedents of technology acceptance of initial eCRM users beyond generation X and the role of self-construal
    • Chen, Q., Chen, H.-M., & Kazman, R. (2007). Investigating antecedents of technology acceptance of initial eCRM users beyond generation X and the role of self-construal. Electronic Commerce Research,7(3–4), 315–339.
    • (2007) Electronic Commerce Research , vol.7 , Issue.3-4 , pp. 315-339
    • Chen, Q.1    Chen, H.-M.2    Kazman, R.3
  • 13
    • 84923218053 scopus 로고    scopus 로고
    • Mobile cloud storage users
    • Choo, K.-K. R. (2014). Mobile cloud storage users. IEEE Cloud Computing,1(3), 20–23.
    • (2014) IEEE Cloud Computing , vol.1 , Issue.3 , pp. 20-23
    • Choo, K.-K.R.1
  • 15
    • 84958083292 scopus 로고    scopus 로고
    • Does Skype use encryption? Retrieved January 30, 2014, from
    • Does Skype use encryption? Retrieved January 30, 2014, from https://support.skype.com/en/faq/FA31/does-skype-use-encryption.
  • 16
    • 79955088769 scopus 로고    scopus 로고
    • Entropy estimation for real-time encrypted traffic identification (Short Paper)
    • Lecture Notes in Computer Science, Springer Berl
    • Dorfinger, P., Panholzer, G., & John, W. (2011). Entropy estimation for real-time encrypted traffic identification (Short Paper). In J. Domingo-Pascual, Y. Shavitt, & S. Uhlig (Eds.), Traffic monitoring and analysis (Vol. 6613, pp. 164–171, Lecture Notes in Computer Science): Springer Berlin Heidelberg.
    • (2011) Traffic monitoring and analysis (Vol. 6613 , pp. 164-171
    • Dorfinger, P.1    Panholzer, G.2    John, W.3    Domingo-Pascual, J.4    Shavitt, Y.5    Uhlig, S.6
  • 17
    • 84958083293 scopus 로고    scopus 로고
    • Fring. Retrieved January 27, 2014, from
    • Fring. Retrieved January 27, 2014, from http://www.fring.com/.
  • 18
    • 85143575517 scopus 로고    scopus 로고
    • Ghaemmaghami, H., Dean, D., Sridharan, S., & McCowan, I. (2010). Noise robust voice activity detection using normal probability testing and time-domain histogram analysis. In Proceedings of the IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), USA, 14–19 March 2010 (pp. 4470–4473)
    • Ghaemmaghami, H., Dean, D., Sridharan, S., & McCowan, I. (2010). Noise robust voice activity detection using normal probability testing and time-domain histogram analysis. In Proceedings of theIEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), USA, 14–19 March 2010 (pp. 4470–4473).
  • 21
    • 84958083295 scopus 로고    scopus 로고
    • Google How Hangouts encrypts information. Retrieved April 3, 2015, from
    • Google How Hangouts encrypts information. Retrieved April 3, 2015, from https://support.google.com/hangouts/answer/6046115?hl=en#.
  • 22
    • 0036697706 scopus 로고    scopus 로고
    • New voice over Internet protocol technique with hierarchical data security protection
    • Guo, J.-I., Yen, J.-C., & Pai, H.-F. (2002). New voice over Internet protocol technique with hierarchical data security protection. IEE Proceedings: Vision, Image and Signal Processing,149(4), 237–243.
    • (2002) IEE Proceedings: Vision, Image and Signal Processing , vol.149 , Issue.4 , pp. 237-243
    • Guo, J.-I.1    Yen, J.-C.2    Pai, H.-F.3
  • 23
    • 84958083296 scopus 로고    scopus 로고
    • Big Blue Ball.com: Instant messaging & social networking. Accessed January 25, 2014
    • Hester, J. (2009). Big Blue Ball.com: Instant messaging & social networking. Accessed January 25, 2014, from http://www.bigblueball.com/im/googletalk/.
    • (2009) from
    • Hester, J.1
  • 24
    • 84958083297 scopus 로고    scopus 로고
    • ICQ Privacy Policy. Accessed April 3, 2015
    • ICQ. (2011). ICQ Privacy Policy. Accessed April 3, 2015, from http://www.icq.com/legal/privacypolicy/en.
    • (2011) from
  • 25
    • 84958083298 scopus 로고    scopus 로고
    • Accessed January 15, 2014
    • Infonetics Research raises VoLTE forecast; Over-the-top mobile VoIP subscribers nearing 1 billion mark (2013). Accessed January 15, 2014, from http://www.infonetics.com/pr/2013/Mobile-VoIP-Services-and-Subscribers-Market-Highlights.asp.
    • (2013) from
    • forecast, I.R.V.L.T.E.1
  • 26
    • 80054854394 scopus 로고    scopus 로고
    • Security measures for VoIP application: A state of the art review
    • Jahanirad, M., AL-Nabhani, Y., & Noor, R. M. (2011). Security measures for VoIP application: A state of the art review. Scientific Research and Essays,6(23), 4950–4959.
    • (2011) Scientific Research and Essays , vol.6 , Issue.23 , pp. 4950-4959
    • Jahanirad, M.1    AL-Nabhani, Y.2    Noor, R.M.3
  • 28
    • 79959557404 scopus 로고    scopus 로고
    • King, A., & Lyons, K. (2011). Automatic status updates in distributed software development. In Proceedings of the 2nd International Workshop on Web 2.0 for Software Engineering, USA, 21–28 May 2011 (pp. 19–24)
    • King, A., & Lyons, K. (2011). Automatic status updates in distributed software development. In Proceedings of the2nd International Workshop on Web 2.0 for Software Engineering, USA, 21–28 May 2011 (pp. 19–24).
  • 29
    • 84881647698 scopus 로고    scopus 로고
    • J., Ko, H.-S., Park, S., Seo, M., & Kim, I. (2011).Study on secure mobile communication based on the hardware security module. In Fifth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2011)
    • Lee, J., Ko, H.-S., Park, S., Seo, M., & Kim, I. (2011).Study on secure mobile communication based on the hardware security module. In Fifth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2011), Portugal, 20–25 November 2011 (pp. 23–26)
    • (2011) Portugal , vol.20-25 , pp. 23-26
  • 31
    • 78249266016 scopus 로고    scopus 로고
    • Implementation and performance for lawful intercept of VoIP calls based on SIP session border controller. In Proceedings of the IEEE 10th International Conference on Computer and Information Technology (CIT)
    • Menghui, Y., Hua, L., & Tonghong, L. (2010). Implementation and performance for lawful intercept of VoIP calls based on SIP session border controller. In Proceedings of the IEEE 10th International Conference on Computer and Information Technology (CIT), United Kingdom, 29 June-1 July 2010 (pp. 2635–2642).
    • (2010) United Kingdom, 29 June-1 July , vol.2010 , pp. 2635-2642
    • Menghui, Y.1    Hua, L.2    Tonghong, L.3
  • 32
    • 33646491223 scopus 로고    scopus 로고
    • Security of a mobile transaction: A trust model
    • Misra, S. K., & Wickamasinghe, N. (2004). Security of a mobile transaction: A trust model. Electronic Commerce Research,4(4), 359–372.
    • (2004) Electronic Commerce Research , vol.4 , Issue.4 , pp. 359-372
    • Misra, S.K.1    Wickamasinghe, N.2
  • 33
    • 84958083301 scopus 로고    scopus 로고
    • Nimbuzz. Accessed January 30, 2014, from
    • Nimbuzz. Accessed January 30, 2014, from http://www.nimbuzz.com/en/support.
  • 34
    • 84958083302 scopus 로고    scopus 로고
    • NSA slides explain the PRISM data-collection program. (2013). The Washington Post
    • NSA slides explain the PRISM data-collection program. (2013). The Washington Post.
  • 35
    • 84958083303 scopus 로고    scopus 로고
    • PcapHistogram. Retrieved January 30, 2014, from
    • PcapHistogram. Retrieved January 30, 2014, from http://www.willhackforsushi.com/code/pcaphistogram.pl.
  • 36
    • 84958083304 scopus 로고    scopus 로고
    • Google defends its use of proprietary tech in Hangouts
    • (May 25)
    • Perez, J. C. (2013, May 25). Google defends its use of proprietary tech in Hangouts. PC World
    • (2013) PC World
    • Perez, J.C.1
  • 37
    • 84958083305 scopus 로고    scopus 로고
    • pyNetEntropy. Accessed January 30, 2014, from
    • pyNetEntropy. Accessed January 30, 2014, from https://github.com/batidiane/pyNetEntropy.
  • 38
    • 84958083306 scopus 로고    scopus 로고
    • Sarkar, A. (2012). Yahoo! Voice Compromised, 450 K Login Credentials Stolen & Posted In Plain Text. Accessed January 30, 2014, from
    • Sarkar, A. (2012). Yahoo! Voice Compromised, 450 K Login Credentials Stolen & Posted In Plain Text. Accessed January 30, 2014, from http://www.voiceofgreyhat.com/2012/07/yahoo-voice-compromised-450k-login.html.
  • 39
    • 84944486544 scopus 로고
    • Prediction and entropy of printed English
    • Shannon, C. E. (1951). Prediction and entropy of printed English. Bell Systems Technical Journal,30(1), 50–64.
    • (1951) Bell Systems Technical Journal , vol.30 , Issue.1 , pp. 50-64
    • Shannon, C.E.1
  • 40
    • 84958083307 scopus 로고    scopus 로고
    • Shepard, B. (2013). 10 Cool Ways Companies Use Skype. Accessed January 30, 2014, from
    • Shepard, B. (2013). 10 Cool Ways Companies Use Skype. Accessed January 30, 2014, from http://blogs.skype.com/2013/08/28/happy-10th-ten-cool-ways-companies-use-skype/.
  • 42
    • 84958083308 scopus 로고    scopus 로고
    • Tango. Accessed January 27, 2014, from
    • Tango. Accessed January 27, 2014, from http://www.tango.me/.
  • 43
    • 84958083309 scopus 로고    scopus 로고
    • Viber are my messages secure? Accessed April 3, 2015, from
    • Viber are my messages secure? Accessed April 3, 2015, from https://support.viber.com/customer/portal/articles/1600146-are-my-messages-secure-#.VR321vmUeSo.
  • 44
    • 84958083310 scopus 로고    scopus 로고
    • Viber Connect Freely. Accessed January 15, 2015, from
    • Viber Connect Freely. Accessed January 15, 2015, from http://www.viber.com/.
  • 45
    • 84958083311 scopus 로고    scopus 로고
    • VoIP Users Conference. Accessed January 27, 2014, from
    • VoIP Users Conference. Accessed January 27, 2014, from http://www.voipusersconference.org/2011/jabber-jitsi-nimbuzz/.
  • 46
    • 84958083312 scopus 로고    scopus 로고
    • Vonage Mobile. Accessed January 30, 2014, from
    • Vonage Mobile. Accessed January 30, 2014, from http://www.vonagemobile.com/.
  • 47
    • 84877626643 scopus 로고    scopus 로고
    • An intrusion detection and prevention system for IMs and VoIP services
    • Vrakas, N., & Lambrinoudakis, C. (2013). An intrusion detection and prevention system for IMs and VoIP services. International Journal of Information Security,2(3), 201–217.
    • (2013) International Journal of Information Security , vol.2 , Issue.3 , pp. 201-217
    • Vrakas, N.1    Lambrinoudakis, C.2
  • 48
    • 79960900018 scopus 로고    scopus 로고
    • A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes
    • Wang, C.-H., & Liu, Y.-S. (2011). A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes. Journal of Network and Computer Applications,34(5), 1545–1556.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.5 , pp. 1545-1556
    • Wang, C.-H.1    Liu, Y.-S.2
  • 49
    • 84958083313 scopus 로고    scopus 로고
    • WeChat The New Way to Connect. Accessed January 15, 2015, from
    • WeChat The New Way to Connect. Accessed January 15, 2015, from http://www.wechat.com/en/.
  • 50
    • 50249161557 scopus 로고    scopus 로고
    • Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob?
    • Wright, C. V., Ballard, L., Monrose, F., & Masson, G. M. (2007). Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In USENIX Security, 2007 (Vol. 3, pp. 43–54, Vol. 3.6)
    • (2007) In USENIX Security , vol.2007 , Issue.Vol. 3, pp. 43–54, Vol. 3.6
    • Wright, C.V.1    Ballard, L.2    Monrose, F.3    Masson, G.M.4
  • 51
    • 84958083315 scopus 로고    scopus 로고
    • Yahoo! 7 Messenger. Accessed January 30, 2014, from
    • Yahoo! 7 Messenger. Accessed January 30, 2014, from http://au.messenger.yahoo.com/features/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.