Technical Papers Parallel Session-II: A survey on security issues, vulnerabilities and attacks in Android based smartphone

Abstract/Description

The use of Smart phones has become very popular around the globe in this digital era and in recent days its user's number has increased at indefinite level, as every one rush to explore the digital world. The people are switching towards Smart phones in order to access many applications such as financial, business, educational and social etc. Therefore these devices are the main target of hackers, however on the other hand the Smart phone manufacturers are trying to design best security model to overcome all vulnerabilities. Here we discuss the Android Security architecture and possible attacks to android OS and also highlight the threats which are associated with these particular devices. This paper describes the vulnerabilities found in Android based Smart phones and also describes the attacks like privilege escalation, privacy attack and other threats which are associated with these particular devices. In last section we discuss the possible countermeasure against the attacks and threats due to that, the Android Smart phones become vulnerable.

Location

Theatre 2, Aman Tower

Session Theme

Technical Papers Parallel Session-II: Networks & Computer Security

Session Type

Parallel Technical Session

Session Chair

Dr. Jawwad Shamsi

Start Date

30-12-2017 2:20 PM

End Date

30-12-2017 2:40 PM

Share

COinS
 
Dec 30th, 2:20 PM Dec 30th, 2:40 PM

Technical Papers Parallel Session-II: A survey on security issues, vulnerabilities and attacks in Android based smartphone

Theatre 2, Aman Tower

The use of Smart phones has become very popular around the globe in this digital era and in recent days its user's number has increased at indefinite level, as every one rush to explore the digital world. The people are switching towards Smart phones in order to access many applications such as financial, business, educational and social etc. Therefore these devices are the main target of hackers, however on the other hand the Smart phone manufacturers are trying to design best security model to overcome all vulnerabilities. Here we discuss the Android Security architecture and possible attacks to android OS and also highlight the threats which are associated with these particular devices. This paper describes the vulnerabilities found in Android based Smart phones and also describes the attacks like privilege escalation, privacy attack and other threats which are associated with these particular devices. In last section we discuss the possible countermeasure against the attacks and threats due to that, the Android Smart phones become vulnerable.