Evaluation of Security Solutions for Android Systems

作者: Yuval Elovici , Asaf Shabtai , Dudu Mimran

DOI:

关键词: Cloud computing securitySecurity information and event managementAndroid (operating system)Computer scienceMarket shareComputer security

摘要: With the increasing usage of smartphones a plethora security solutions are being designed and developed. Many fail to cope with advanced attacks not aways properly for smartphone platforms. Therefore, there is need methodology evaluate their effectiveness. Since Android operating system has highest market share today, we decided focus on it in this study which review some state-of-the-art Android-based smartphones. In addition, present set evaluation criteria aiming at evaluating mechanisms that specifically We believe proposed framework will help solution designers develop more effective assist experts effectiveness

参考文章(41)
Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W. Freeh, Taming information-stealing smartphone applications (on Android) trust and trustworthy computing. pp. 93- 107 ,(2011) , 10.1007/978-3-642-21599-5_7
Tilo Müller, Michael Spreitzenbarth, FROST: forensic recovery of scrambled telephones applied cryptography and network security. pp. 373- 388 ,(2013) , 10.1007/978-3-642-38980-1_23
Timothy Vidas, Nicolas Christin, Daniel Votipka, All your droid are belong to us: a survey of current android attacks WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies. pp. 10- 10 ,(2011)
Luca Verderame, Alessio Merlo, Alessandro Armando, Security Issues in the Android Cross-Layer Architecture arXiv: Cryptography and Security. ,(2012)
Sahin Albayrak, Seyit Camtepe, Jan Clausen, Aubrey-Derrick Schmidt, Kamer Ail Yuksel, Hans-Gunterh Schmidt, Kiraz Osman, Enhancing security of linux-based android devices School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty. ,(2008)
Machigar Ongtang, Stephen McLaughlin, William Enck, Patrick McDaniel, Semantically rich application-centric security in Android Security and Communication Networks. ,vol. 5, pp. 658- 673 ,(2012) , 10.1002/SEC.360
Alessandro Armando, Alessio Merlo, Mauro Migliardi, Luca Verderame, Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) information security conference. pp. 13- 24 ,(2012) , 10.1007/978-3-642-30436-1_2
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, Andromaly: a behavioral malware detection framework for android devices intelligent information systems. ,vol. 38, pp. 161- 190 ,(2012) , 10.1007/S10844-010-0148-X