Abdul Kadir et al., 2024 - Google Patents
Android Operating SystemAbdul Kadir et al., 2024
- Document ID
- 1086092991894281507
- Author
- Abdul Kadir A
- Habibi Lashkari A
- Daghmehchi Firoozjaei M
- Publication year
- Publication venue
- Understanding Cybersecurity on Smartphones: Challenges, Strategies, and Trends
External Links
Snippet
This chapter presents an overview of the Android operating system, focusing on its history, vulnerabilities, adversarial techniques, malware types, mitigating attacks, and the utilization of Android services. The chapter begins by exploring the basics of Android history …
- 238000000034 method 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Qamar et al. | Mobile malware attacks: Review, taxonomy & future directions | |
Garg et al. | Comparative analysis of Android and iOS from security viewpoint | |
Teufl et al. | Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) | |
US20160099960A1 (en) | System and method for scanning hosts using an autonomous, self-destructing payload | |
Pierazzi et al. | A data-driven characterization of modern Android spyware | |
Hassan | Ransomware revealed | |
Sharma et al. | A survey on analysis and detection of Android ransomware | |
Bhardwaj | Ransomware: A rising threat of new age digital extortion | |
Sasi et al. | A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges | |
Kadir et al. | Understanding android financial malware attacks: Taxonomy, characterization, and challenges | |
Ashawa et al. | Analysis of mobile malware: a systematic review of evolution and infection strategies | |
Walls et al. | A review of free cloud-based anti-malware apps for android | |
Hassan et al. | Digital Privacy and Security Using Windows: A Practical Guide | |
Chayal et al. | A review on spreading and forensics analysis of windows-based ransomware | |
Yadav et al. | A review on malware analysis for iot and android system | |
Sharma et al. | Android malwares with their characteristics and threats | |
Abdul Kadir et al. | Android Operating System | |
Agrawal et al. | Cyber Risks and Security—A Case Study on Analysis of Malware | |
Oberoi | Androsat: Security analysis tool for android applications | |
Muttik | Securing mobile devices: Present and future | |
Trieu | Android Malware Analysis | |
Kadir et al. | Understanding Cybersecurity on Smartphones | |
Ning | Analysis of the Latest Trojans on Android Operating System | |
Alexander | Examining the Efficacy of Defensive Strategies Designed to Prevent Ransomware in K-12 School Districts: A Case Study | |
Perez | Analysis and Detection of the Silent Thieves |