2018 IEEE International Conference on Applied System Invention (ICASI) 2018
DOI: 10.1109/icasi.2018.8394488
|View full text |Cite
|
Sign up to set email alerts
|

Android (Nougats) security issues and solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…These abstractions make it easier for the users to manipulate sockets and handle the various connections to the network. It integrates run loop, so using cfnetwork does not need to implement event loop by itself [24,25,26].…”
Section: The Ios Platform With Multidimensional Information Transmiss...mentioning
confidence: 99%
“…These abstractions make it easier for the users to manipulate sockets and handle the various connections to the network. It integrates run loop, so using cfnetwork does not need to implement event loop by itself [24,25,26].…”
Section: The Ios Platform With Multidimensional Information Transmiss...mentioning
confidence: 99%
“…Iqbal et al [69] Google has built a simple Linux kernel designed to operate on touch-screen platform such as tablets and smartphones with the Android mobile operating system. As a result of poor OS protections, numerous security attacks have made it vulnerable to restricting the access of third-party applications from sensitive infrastructure.…”
Section: Duca Et Al [65] Presented Real-time Opensourcing Driver Implementation For Texasmentioning
confidence: 99%
“…Malware developers can develop applications that may appear normal but, can severely compromise user's privacy, steal user's personal data, and spy on user and commit other malicious activities, designed specially with the intention to gain authorized access to target's smartphone and steal personal information to sell for profit or perform other harmful activities. [2] There are essentially two sorts of malware recognition strategies static and dynamic. Static techniques can detect malware before executing Android application by examining code.…”
Section: Introductionmentioning
confidence: 99%