Analysis of latest vulnerabilities in android

作者: Umasankar

DOI: 10.1109/ICACCI.2017.8126011

关键词:

摘要: Alongside the fast development of new science and innovation, elements Smart gadgets like Phones, TV, smart watches home appliances, IoT devices etc. turn out to be increasingly powerful are playing a basic part in day today world. Operating systems Android, iOS, Windows, Blackberry so on gives an operating environment for [1]. Linux kernel based open source system developed by Google Inc. is most popular largest installed base, worldwide gadgets. Android now also providing platform called things. Even though it brings great convenience people, possesses security privacy issues. Malicious applications have become big threat mobile security, exploiting various vulnerabilities they emerging variants zero days. Thus, efficient analysis effective detection method important necessary avoid loss data which may lead impact individuals organizations depending severity malicious application. A proper scanning present android performed this work. We create framework find applications. Here created with OWASP Droid Fusion data's collected from National Vulnerability Database (NVD) Mobile Top 10.

参考文章(5)
Ankita Khandelwal, A K Mohapatra, An insight into the security issues and their solutions for android phones international conference on computing for sustainable global development. pp. 106- 109 ,(2015)
Vaibhav Rastogi, Yan Chen, Xuxian Jiang, Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 99- 108 ,(2014) , 10.1109/TIFS.2013.2290431
Tianda Yang, Yu Yang, Kai Qian, Dan Chia-Tien Lo, Ying Qian, Lixin Tao, Automated Detection and Analysis for Android Ransomware high performance computing and communications. pp. 1338- 1343 ,(2015) , 10.1109/HPCC-CSS-ICESS.2015.39
Jignesh Joshi, Chandresh Parekh, Android smartphone vulnerabilities: A survey international conference advances computing communication and automation. pp. 1- 5 ,(2016) , 10.1109/ICACCA.2016.7578857
P. D. Meshram, R.C. Thool, A survey paper on vulnerabilities in android OS and security of android devices 2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN). pp. 174- 178 ,(2014) , 10.1109/GCWCN.2014.7030873