2016 International Conference on Advances in Computing, Communication, &Amp; Automation (ICACCA) (Spring) 2016
DOI: 10.1109/icacca.2016.7578857
|View full text |Cite
|
Sign up to set email alerts
|

Android smartphone vulnerabilities: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…It should be noted that system integrity is required for the validation of certificate trust chains to work. Android’s inconsistent history with system security in the past could make it more likely that an attacker might use unpatched issues to gain privileges on the system and install any certificates wanted or to do further harm [42,43]. A major issue with Android phones is the lack of willingness in phone manufacturers to ship security updates to their adoptions of Android, leading to a high degree of version fragmentation in the market [9,44].…”
Section: Methodsmentioning
confidence: 99%
“…It should be noted that system integrity is required for the validation of certificate trust chains to work. Android’s inconsistent history with system security in the past could make it more likely that an attacker might use unpatched issues to gain privileges on the system and install any certificates wanted or to do further harm [42,43]. A major issue with Android phones is the lack of willingness in phone manufacturers to ship security updates to their adoptions of Android, leading to a high degree of version fragmentation in the market [9,44].…”
Section: Methodsmentioning
confidence: 99%
“…Permissions from [1] through [3] in Figure 3 show the same permissions that exist in both versions of before and after application the update. [4] through [6] indicate permissions that existed in the version of before application the update but were deleted after the update. [7] - [14] shows newly added permissions that did not exist in the version of before application the update but were added in the update process.…”
Section: Analysis Resultsmentioning
confidence: 99%
“…The AndroidManifest.xml file contains information on the application including <activity>, <Intent-filter>, and <uses-permission> [4][5][6]. This paper analyzes permissions of the versions of before and after application the update by analyzing the AnadroidManifest.xml file.…”
Section: Androidmanifesxml Filementioning
confidence: 99%
“…In fact, anyone can develop an app and share it on the app stores to earn money or personal gain [12]. Commonly, all app stores check the apps by high-level anti-malware before releasing them.…”
Section: B Smartphone Os Featuresmentioning
confidence: 99%