ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES
Journal: ICTACT Journal on Communication Technology (IJCT) (Vol.5, No. 1)Publication Date: 2014-03-01
Authors : Himanshu Shewale; Sameer Patil; Vaibhav Deshmukh; Pragya Singh;
Page : 863-867
Keywords : Android; Vulnerability; Exploit; Malware; Linux Kernel;
Abstract
Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.
Other Latest Articles
- Energy Efficient Data Collections Structure for Wireless Sensor Networks
- Security in Routing Protocol for Ad Hoc Networks
- A Review on Database Security
- Acute Toxicity Studies of Erythrophleum suaveolens in Albino Mice (Mus musculus)
- Early Warning Systems and Disaster Management using Mobile Crowdsourcing
Last modified: 2014-05-06 17:54:35