A Survey Paper on Vulnerabilities in Android OS and Security of Android Devices

被引:0
作者
Meshram, P. D. [1 ]
Thool, R. C. [1 ]
机构
[1] SGGSIE&T Nanded, Dept Informat Technol, Nanded, Maharashtra, India
来源
2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN) | 2014年
关键词
Android; vulnerability; Smartphone; Security; attacks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The amount of malicious mobile application targeting Android based smartphones has increase rapidly. In addition, these malicious apps are capable of downloading modules from servers which are run by malicious users, meaning that unexpected events can be activated inside of smartphones. Therefore, the attacker can control and get personal information and data stored inside of smartphone illegally. Smartphones are not just phones but also portable computers, providing diverse services needed in life including calls, texts, emails, GPS, camera, Wi-Fi and Bluetooth apps. These apps keep and manage diverse intrinsic data as well as sensitive private information such as address books. Smartphones enable swift and easy data exchange via 3G, 4G and Wi-Fi. Thus, personal information stored on Smartphones is prone to leakage.
引用
收藏
页码:174 / 178
页数:5
相关论文
共 13 条
[1]  
[Anonymous], 2014, IDC WORLDWIDE MOBILE
[2]  
[Anonymous], NASTR00942008 PENNS
[3]  
Biasing Thomas, 2010, 5 INT C MAL UNW SOFT
[4]  
Cho Taenam, 2011, KIISC, V21, P19
[5]  
Felt A.P., 2012, Android permissions: User attention, comprehension, and behavior
[6]  
Goasduff L., Gartner Says Worldwide Smartphone Sales to Grow 11% in 2021
[7]  
Houmansadr Amir, 2011, IEEE IFIP 41 INT C
[8]  
Naraine R., 2008, Google Android vulnerable to drive-by browser exploit
[9]  
Oberheide J., 2008, 17 USENIX SEC S SAN
[10]  
Oberheide J., 2008, P 1 WORKSHOP VISUALI, P31, DOI DOI 10.1145/1622103.1629656