A malicious attacks and defense techniques on android-based smartphone platform

ISSN: 22783075
1Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.

Abstract

In this digital era after computer and internet smartphone is the third revolution and making ubiquitous computing possible. Android lead the smartphone market as most used operating system. This popularity of Android also makes it primary targets of cyber attackers and hackers. There are many different types of cyber-attacks targeted towards Andorid environment. In this review paper, we have investigated various attacks reported with respect to Android and have also gathered different type of defenses available to protect users from these attacks. This work is focus on accumulating various literature works available in this domain and provide a comprehensive representation of these works. The various works are grouped into two broad categories i.e. signature and non-signature based, and techniques mentioned in each work is studied and technical observations are made against them which help to understand the usability of these techniques. Such organized and details review work is required to study the problem in depth and works towards solution. The literature works are summarized and organized in proper table which help to visualized and easy comparison the information.

Author supplied keywords

Cite

CITATION STYLE

APA

Khan, M. R., Tripathi, R. C., & Kumar, A. (2019). A malicious attacks and defense techniques on android-based smartphone platform. International Journal of Innovative Technology and Exploring Engineering, 8(8 Special Issue 3), 361–369.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free