Technical Papers Parallel Session-II: A survey on security issues, vulnerabilities and attacks in Android based smartphone
Abstract/Description
The use of Smart phones has become very popular around the globe in this digital era and in recent days its user's number has increased at indefinite level, as every one rush to explore the digital world. The people are switching towards Smart phones in order to access many applications such as financial, business, educational and social etc. Therefore these devices are the main target of hackers, however on the other hand the Smart phone manufacturers are trying to design best security model to overcome all vulnerabilities. Here we discuss the Android Security architecture and possible attacks to android OS and also highlight the threats which are associated with these particular devices. This paper describes the vulnerabilities found in Android based Smart phones and also describes the attacks like privilege escalation, privacy attack and other threats which are associated with these particular devices. In last section we discuss the possible countermeasure against the attacks and threats due to that, the Android Smart phones become vulnerable.
Keywords
Location
Theatre 2, Aman Tower
Session Theme
Technical Papers Parallel Session-II: Networks & Computer Security
Session Type
Parallel Technical Session
Session Chair
Dr. Jawwad Shamsi
Start Date
30-12-2017 2:20 PM
End Date
30-12-2017 2:40 PM
Recommended Citation
Hur, J. B., & Shamsi, J. A. (2017). Technical Papers Parallel Session-II: A survey on security issues, vulnerabilities and attacks in Android based smartphone. International Conference on Information and Communication Technologies. Retrieved from https://ir.iba.edu.pk/icict/2017/2017/14
COinS
Technical Papers Parallel Session-II: A survey on security issues, vulnerabilities and attacks in Android based smartphone
Theatre 2, Aman Tower
The use of Smart phones has become very popular around the globe in this digital era and in recent days its user's number has increased at indefinite level, as every one rush to explore the digital world. The people are switching towards Smart phones in order to access many applications such as financial, business, educational and social etc. Therefore these devices are the main target of hackers, however on the other hand the Smart phone manufacturers are trying to design best security model to overcome all vulnerabilities. Here we discuss the Android Security architecture and possible attacks to android OS and also highlight the threats which are associated with these particular devices. This paper describes the vulnerabilities found in Android based Smart phones and also describes the attacks like privilege escalation, privacy attack and other threats which are associated with these particular devices. In last section we discuss the possible countermeasure against the attacks and threats due to that, the Android Smart phones become vulnerable.