11 research outputs found

    Mobile Application Security Platforms Survey

    Get PDF
    Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing Unit), Storage and installing numerous applications. Therefore, Security is considered as an important factor in wireless communication technologies, particularly in a wireless ad-hoc network and mobile operating systems. Moreover, based on increasing the range of mobile application within variety of platforms, security is regarded as on the most valuable and considerable debate in terms of issues, trustees, reliabilities and accuracy. This paper aims to introduce a consolidated report of thriving security on mobile application platforms and providing knowledge of vital threats to the users and enterprises. Furthermore, in this paper, various techniques as well as methods for security measurements, analysis and prioritization within the peak of mobile platforms will be presented. Additionally, increases understanding and awareness of security on mobile application platforms to avoid detection, forensics and countermeasures used by the operating systems. Finally, this study also discusses security extensions for popular mobile platforms and analysis for a survey within a recent research in the area of mobile platform security

    Security assessment of the selected mobile platform

    Get PDF
    Smartphones were gradually gaining popularity, so as to effectively replace traditional telephones. Devices creates many capabilities, but they can be a source of threats. In this article analyzed Android system security. Author checked what threats lurk for mobile devices and how the Android system tries to protect them. The questionnaire survey checked how the phone screens are blocked and how often changes are made to the blockade. To check if the screen lock can be removed, tests were performed using Google to find the device, as well as Fone. A summary of results was presented and conclusions were drawn

    A Review of Smishing Attaks Mitigation Strategies

    Get PDF
    Mobile Smishing crime has continued to escalate globally due to technology enhancements and people's growing dependence on smartphones and other technologies. SMS facilitates the distribution of crucial information that is principally important for non-digital savvy users who are typically underprivileged. Smishing, often known as SMS phishing, entails transmitting deceptive text messages to lure someone into revealing individual information or installing malware. The number of incidences of smishing has increased tremendously as the internet and cellphones have spread to even the most remote regions of the globe

    A Model of Virus Infection Dynamics in Mobile Personal Area Network

    Get PDF
    In this paper, the authors explore the mobile network security focused on the virus threat. Firstly, the authors explain the importance of mobile network security which sometimes not really takes into considerations by users. This paper then explains the virus threat of mobile devices virus where it explains how the viruses spread. The threats can be in three major forms namely the virus spreading via mobile personal area network, virus spreading via internet access and virus spreading via messaging. Lastly a model explains the dynamics of the infection on Mobile Network is introduced

    Android Application Security Scanning Process

    Get PDF
    This chapter presents the security scanning process for Android applications. The aim is to guide researchers and developers to the core phases/steps required to analyze Android applications, check their trustworthiness, and protect Android users and their devices from being victims to different malware attacks. The scanning process is comprehensive, explaining the main phases and how they are conducted including (a) the download of the apps themselves; (b) Android application package (APK) reverse engineering; (c) app feature extraction, considering both static and dynamic analysis; (d) dataset creation and/or utilization; and (e) data analysis and data mining that result in producing detection systems, classification systems, and ranking systems. Furthermore, this chapter highlights the app features, evaluation metrics, mechanisms and tools, and datasets that are frequently used during the app’s security scanning process

    An Analysis of Vulnerabilities Presented by Android Malware and Ios Jailbreaks

    Get PDF
    Mobile devices are increasingly becoming a greater crutch for all generations. All the while, these users are garnering a greater desire for privacy and style. Apple presents a device that is known for its security, but lacks major user customization. On the other hand, Google has developed a device that is keen to customization with Android, but can be susceptible to security flaws. This thesis strives to discuss the security models, app store protections, and best practices of both mobile operating systems. In addition, multiple experiments were conducted to demonstrate how an Android device could be more easily compromised after altering few settings, as well as to demonstrate the privileges, both good and bad, that could be gained by jailbreaking an iOS device

    An Analysis of Vulnerabilities Presented by Android Malware and Ios Jailbreaks

    Get PDF
    Mobile devices are increasingly becoming a greater crutch for all generations. All the while, these users are garnering a greater desire for privacy and style. Apple presents a device that is known for its security, but lacks major user customization. On the other hand, Google has developed a device that is keen to customization with Android, but can be susceptible to security flaws. This thesis strives to discuss the security models, app store protections, and best practices of both mobile operating systems. In addition, multiple experiments were conducted to demonstrate how an Android device could be more easily compromised after altering few settings, as well as to demonstrate the privileges, both good and bad, that could be gained by jailbreaking an iOS device

    Vers une détection automatique des applications malveillantes dans les environnements Android

    Get PDF
    National audienceDans ce papier, nous présentons l'état de l'art sur les attaques et les menaces dans les environnements Android ainsi que les approches de détection associées. La plupart de ces approches utilisent des informations obtenues par instrumentation de la machine virtuelle ou par rétro-ingénierie du bytecode des applications. Nous proposons ainsi une nouvelle méthode moins coûteuse qui repose sur l'analyse des journaux des événements applicatifs et systÚmes générés par la plate-forme Android. Cette analyse nous permettra d'établir des signatures des applications Android associant leurs structures et leurs comportements dynamiques

    Telecommunication Systems

    Get PDF
    This book is based on both industrial and academic research efforts in which a number of recent advancements and rare insights into telecommunication systems are well presented. The volume is organized into four parts: "Telecommunication Protocol, Optimization, and Security Frameworks", "Next-Generation Optical Access Technologies", "Convergence of Wireless-Optical Networks" and "Advanced Relay and Antenna Systems for Smart Networks." Chapters within these parts are self-contained and cross-referenced to facilitate further study

    Viver sem segredos: a privacidade dos dados pessoais na era dos smartphones

    Get PDF
    Atualmente, verifica-se que os Smartphones tĂȘm enfrentado um grande crescimento a nĂ­vel mundial na vida das pessoas. As inĂșmeras vantagens destes dispositivos para os seus utilizadores tĂȘm sido cada vez mais evidentes. Estes aparelhos vivem da partilha de informação: os utilizadores nĂŁo sĂł recebem a informação pretendida, como tambĂ©m a podem partilhar. No entanto, em muitas instĂąncias, o utilizador acaba por compartilhar dados privados sem se aperceber, sem ter conhecimento, e muitas vezes sem o seu consentimento - dados estes que sĂŁo recolhidos pelas empresas de telecomunicaçÔes e, pior ainda, vendidos a terceiros. Assim, esta partilha de dados descontrolada atravĂ©s do Smartphone pode implicar riscos e atĂ© mesmo ameaçar o direito de privacidade dos seus utilizadores, incluindo tambĂ©m aqueles com quem se troca dados atravĂ©s do Smartphone. Este estudo propĂ”e-se a compreender atĂ© que ponto os estudantes universitĂĄrios sabem que a sua privacidade estĂĄ a ser posta em causa atravĂ©s da utilização de Smartphones. O objetivo central do estudo Ă© perceber se, por um lado, este grupo de utilizadores se preocupa com a sua privacidade digital enquanto usa Smartphones ou se, por outro lado, lhes Ă© indiferente o facto de terceiros conseguirem ter acesso aos seus dados privados sem o seu consentimento. Foram utilizadas duas tĂ©cnicas para a recolha de dados: a) a entrevista com a observação dos alunos, b) o inquĂ©rito. Produziu-se um guiĂŁo para as entrevistas com o objetivo de registar e observar comportamentos com o Smartphone. Por fim, elaborou-se um questionĂĄrio com o intuito de recolher dados sobre a atividade, interação e opiniĂŁo na utilização do telemĂłvel. A construção de ambas as ferramentas para a recolha de dados foram elaboradas com recurso ao modelo TUM, para que fosse possĂ­vel, com uma adaptação deste modelo, medir a aceitação da tecnologia dos Smartphones juntamente com os riscos de privacidade de dados privados. Com os resultados obtidos, concluiu-se que os estudantes que participaram neste estudo, de um modo geral, nĂŁo estĂŁo dispostos a abdicar da utilidade que o Smartphone lhes dĂĄ, mesmo que tal signifique que terceiros tenham acesso aos seus dados privados registados pelos aparelhos. Por outras palavras, pode-se dizer que estĂŁo dispostos a ter uma vida transparente perante as organizaçÔes que lhes disponibilizam os serviços atravĂ©s do Smartphone e perante terceiros que acedem a esses mesmos dados privados.Smartphones have shown tremendous worldwide growth in the lives of people around the world. The numerous advantages of these devices for their users have been increasingly evident. These devices live by sharing information, where users not only receive the desired information, but can also share information. However, in many instances, the user shares private data without realizing it, without being aware of it and even without their consent, data that is collected by the telecommunications companies and even worse sold to unknown third parties. This uncontrolled data sharing through the Smartphone can mean risks and even threaten the privacy right to its users, including also the users with whom data is exchanged via the Smartphone. This study aims to understand the extent to which university students know that their privacy is being called into question through the use of smartphones. A central objective of the study is to understand whether this group of users is concerned with their digital privacy while using Smartphones or whether, on the other hand, they are indifferent to the fact that third parties gain access to their private data without their consent. Two techniques were used for data collection: a) the interview with the students' observation, b) the survey. A guide was developed for the interviews in order to record and observe behaviors with the Smartphone. The prepared questionnaire was used to collect data on the activity, interaction and opinion in their respective use of the Smartphone. The construction of both tools for data collection were elaborated using the TUM model, so that it was possible, with an adaptation of this model, to measure the acceptance of Smartphones technology together with the privacy risks of private data. With the results obtained, it was concluded that the students in this study are in no way willing to give up the utility that the Smartphone gives them, even if it means that third parties have access to their private data registered by the Smartphones. In other words, it can be said that they are willing to have a transparent life before the organizations that make services available to them through their Smartphone and third parties that access these same private data
    corecore