[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Abdul Kadir et al., 2024 - Google Patents

Android Operating System

Abdul Kadir et al., 2024

Document ID
1086092991894281507
Author
Abdul Kadir A
Habibi Lashkari A
Daghmehchi Firoozjaei M
Publication year
Publication venue
Understanding Cybersecurity on Smartphones: Challenges, Strategies, and Trends

External Links

Snippet

This chapter presents an overview of the Android operating system, focusing on its history, vulnerabilities, adversarial techniques, malware types, mitigating attacks, and the utilization of Android services. The chapter begins by exploring the basics of Android history …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs

Similar Documents

Publication Publication Date Title
Qamar et al. Mobile malware attacks: Review, taxonomy & future directions
Garg et al. Comparative analysis of Android and iOS from security viewpoint
Teufl et al. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
US20160099960A1 (en) System and method for scanning hosts using an autonomous, self-destructing payload
Pierazzi et al. A data-driven characterization of modern Android spyware
Hassan Ransomware revealed
Sharma et al. A survey on analysis and detection of Android ransomware
Bhardwaj Ransomware: A rising threat of new age digital extortion
Sasi et al. A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
Kadir et al. Understanding android financial malware attacks: Taxonomy, characterization, and challenges
Ashawa et al. Analysis of mobile malware: a systematic review of evolution and infection strategies
Walls et al. A review of free cloud-based anti-malware apps for android
Hassan et al. Digital Privacy and Security Using Windows: A Practical Guide
Chayal et al. A review on spreading and forensics analysis of windows-based ransomware
Yadav et al. A review on malware analysis for iot and android system
Sharma et al. Android malwares with their characteristics and threats
Abdul Kadir et al. Android Operating System
Agrawal et al. Cyber Risks and Security—A Case Study on Analysis of Malware
Oberoi Androsat: Security analysis tool for android applications
Muttik Securing mobile devices: Present and future
Trieu Android Malware Analysis
Kadir et al. Understanding Cybersecurity on Smartphones
Ning Analysis of the Latest Trojans on Android Operating System
Alexander Examining the Efficacy of Defensive Strategies Designed to Prevent Ransomware in K-12 School Districts: A Case Study
Perez Analysis and Detection of the Silent Thieves