android security
Recently Published Documents


TOTAL DOCUMENTS

81
(FIVE YEARS 6)

H-INDEX

12
(FIVE YEARS 0)

Author(s):  
Munishka Vijayvergiya ◽  
Abhignya Tayi ◽  
Sanya jain ◽  
Sanjana Reddy

Today, smartphones and Android devices are effectively in development like never before and have become the easiest cybercrime forum. It is necessary for security experts to investigate the vengeful programming composed for these frameworks if we closely observe the danger to security and defence. The main objective of this paper was to describe Mobile Sandbox, which is said to be a platform intended to periodically examine Android applications in new ways. First of all in the essence of the after-effects of static analysis that is used to handle the dynamic investigation, it incorporates static and dynamic examination and attempts to justify the introduction of executed code. On the other hand, to log calls to native APIs, it uses those techniques, and in the end, it combines the end results with machine learning techniques to collect the samples analysed into dangerous ones. We reviewed the platform for more than 69, 000 applications from multi-talented Asian international businesses sectors and found that about 21% of them officially use the local calls in their code


Author(s):  
Munishka Vijayvergiya ◽  
◽  
Abhignya Tayi ◽  
Sanya Jain ◽  
Sanjana Reddy ◽  
...  

Today, smartphones and Android devices are effectively in development like never before and have become the easiest cybercrime forum. It is necessary for security experts to investigate the vengeful programming composed for these frameworks if we closely observe the danger to security and defence. The main objective of this paper was to describe Mobile Sandbox, which is said to be a platform intended to periodically examine Android applications in new ways. First of all in the essence of the after-effects of static analysis that is used to handle the dynamic investigation, it incorporates static and dynamic examination and attempts to justify the introduction of executed code. On the other hand, to log calls to native APIs, it uses those techniques, and in the end, it combines the end results with machine learning techniques to collect the samples analysed into dangerous ones. We reviewed the platform for more than 69, 000 applications from multi-talented Asian international businesses sectors and found that about 21% of them officially use the local calls in their code.


Author(s):  
Stephen Bier ◽  
Brian Fajardo ◽  
Obinna Ezeadum ◽  
German Guzman ◽  
Kazi Zakia Sultana ◽  
...  
Keyword(s):  

2021 ◽  
Vol 24 (3) ◽  
pp. 1-35
Author(s):  
René Mayrhofer ◽  
Jeffrey Vander Stoep ◽  
Chad Brubaker ◽  
Nick Kralevich

Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, its underlying security model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security experts. The model needs to strike a difficult balance between security, privacy, and usability for end users, assurances for app developers, and system performance under tight hardware constraints. While many of the underlying design principles have implicitly informed the overall system architecture, access control mechanisms, and mitigation techniques, the Android security model has previously not been formally published. This article aims to both document the abstract model and discuss its implications. Based on a definition of the threat model and Android ecosystem context in which it operates, we analyze how the different security measures in past and current Android implementations work together to mitigate these threats. There are some special cases in applying the security model, and we discuss such deliberate deviations from the abstract model.


2021 ◽  
Author(s):  
R. Thamilselvan ◽  
K. Tamil Selvi ◽  
C. Mahalakshmi ◽  
N. Sanjeev ◽  
Yogesh Bala

Author(s):  
Weixian Yao ◽  
Yexuan Li ◽  
Weiye Lin ◽  
Tianhui Hu ◽  
Imran Chowdhury ◽  
...  

Author(s):  
Sadegh Farhang ◽  
Mehmet Bahadir Kirdan ◽  
Aron Laszka ◽  
Jens Grossklags

Sign in / Sign up

Export Citation Format

Share Document