ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES

Journal: ICTACT Journal on Communication Technology (IJCT) (Vol.5, No. 1)

Publication Date:

Authors : ; ; ; ;

Page : 863-867

Keywords : Android; Vulnerability; Exploit; Malware; Linux Kernel;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

Last modified: 2014-05-06 17:54:35