2017
DOI: 10.14569/ijacsa.2017.081005
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks

Abstract: Abstract-Nowadays, the usage of smartphones and their applications have become rapidly popular in people's daily life. Over the last decade, availability of mobile money services such as mobile-payment systems and app markets have significantly increased due to the different forms of apps and connectivity provided by mobile devices, such as 3G, 4G, GPRS, and Wi-Fi, etc. In the same trend, the number of vulnerabilities targeting these services and communication networks has raised as well. Therefore, smartphone… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 37 publications
0
4
0
Order By: Relevance
“…Choi (2008) suggests that one's online routines and the way in which these routines are managed, provide opportunities for victimisation in an online environment. We noted earlier that social media use is one of the biggest emerging threats for cybersecurity (Jang-Jaccard and Nepal, 2014), but boredom can also lead to increases in things like online play which brings a number of cybersecurity concerns, particularly when that play is associated with apps downloaded onto smartphones and tablets (Lu et al, 2012;Ahvanooey et al, 2017).…”
Section: Vulnerabilities Arising From Loss Of Day-to-day Routinementioning
confidence: 99%
“…Choi (2008) suggests that one's online routines and the way in which these routines are managed, provide opportunities for victimisation in an online environment. We noted earlier that social media use is one of the biggest emerging threats for cybersecurity (Jang-Jaccard and Nepal, 2014), but boredom can also lead to increases in things like online play which brings a number of cybersecurity concerns, particularly when that play is associated with apps downloaded onto smartphones and tablets (Lu et al, 2012;Ahvanooey et al, 2017).…”
Section: Vulnerabilities Arising From Loss Of Day-to-day Routinementioning
confidence: 99%
“…The mobile developers should minimize the mobile data access permissions to avoid malicious virus such as spyware, Rootkit and Trojan horses (Zhu et al, 2014). The users should keep mobile operating system up to date, encrypt mobile phone and use mobile security software (Ahvanooey et al, 2017). To protect the privacy of the residents thereat, images obtained of the ovitraps should be captured without their occupants.…”
Section: Discussionmentioning
confidence: 99%
“…As the social adoption of mobile platforms (namely smartphones, tablets and even IoT related devices) has become wider, the number of threats and security incidents for these kinds of devices has also increased [1], [12]- [14]. In this way, the topic of mobile security has consequently received significant attention by the research community in the last years [15]- [21], with a number of specific proposals being developed and specially focused on Android platforms.…”
Section: Background On Access Control For Mobile Platformsmentioning
confidence: 99%