Filters








12,138 Hits in 5.8 sec

Security steps for smartphone users

Heloise Pieterse, Martin S Olivier
2013 2013 Information Security for South Africa  
To evaluate the adequacy of current mobile security applications a malicious Android application is developed and deployed on an Android smartphone.  ...  This study focus on the current state of mobile malware, the adequacy of mobile security applications and possible security steps smartphone users can take to prevent mobile malware attacks.  ...  Users must frequently monitor the data consumption, battery life and applications installed on the smartphone.  ... 
doi:10.1109/issa.2013.6641036 dblp:conf/issa/PieterseO13 fatcat:nyyg6ootdfdfzju3fjul2ndw24

A Novel Strategy to Enhance the Android Security Framework

Muneer AhmadDar, Javed Parvez
2014 International Journal of Computer Applications  
With the widespread use of the Smartphone, the security of data stored in a Smartphone has reached to an utmost importance to all of us.  ...  A novel approach to secure the data on Smartphone's using cryptographic Algorithms is also discussed in this paper.  ...  In section 4 we then have a detailed description of the proposed security Android Framework which will protect our data on our personal Smartphone. Finally we draw our conclusions in section 5.  ... 
doi:10.5120/15904-5142 fatcat:akcf2ohibrfornlyhi5xoqlu5a

Taming Mr Hayes: Mitigating signaling based attacks on smartphones

Collin Mulliner, Steffen Liebergeld, Matthias Lange, Jean-Pierre Seifert
2012 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012)  
The respective attacks can be performed by hijacked smartphones and by malware resident on mobile phones.  ...  We implemented and evaluated our protection system on a real smartphone.  ...  This can only be achieved, if our protection system is spatially isolated from the smartphone OS, e.g. it must not depend on its correct operation.  ... 
doi:10.1109/dsn.2012.6263943 dblp:conf/dsn/MullinerLLS12 fatcat:dl4rugkxpzgk5clog2ccp75ktm

Mobile Device Encryption Systems [chapter]

Peter Teufl, Thomas Zefferer, Christof Stromberger
2013 IFIP Advances in Information and Communication Technology  
The applied encryption protects the data when access to the smartphone is gained either through theft or malicious software.  ...  Due to the important influence of the developer on the security of the iOS Data Protection system, we also present a tool that supports administrators in evaluating the right choice of data protection  ...  On Android, the file-system encryption is not enabled by default and must either be activated by the user or by the respective policy of the MDM system.  ... 
doi:10.1007/978-3-642-39218-4_16 fatcat:tj3kfnnb6fgbjfasctusjlof3m

Assessing Privacy Risks in Android: A User-Centric Approach [chapter]

Alexios Mylonas, Marianthi Theoharidou, Dimitris Gritzalis
2014 Lecture Notes in Computer Science  
Thus, per user privacy risk assessment is not achievable. This paper refines our previous work on smartphone risk assessment by proposing an approach for assessing the privacy risk of Android users.  ...  The increasing presence of privacy violating apps in app marketplaces poses a significant privacy risk for smartphone users.  ...  needed for the purpose of the collection, (iv) user data must be collected by apps with the knowledge and consent of the individual, (v) user data must not be communicated to third parties, except under  ... 
doi:10.1007/978-3-319-07076-6_2 fatcat:ui3qhzpmmjajze4vfxqcurki3y

Assessing Privacy Risks in Android: A User-Centric Approach [chapter]

Alexios Mylonas, Marianthi Theoharidou, Dimitris Gritzalis
2014 Lecture Notes in Computer Science  
Thus, per user privacy risk assessment is not achievable. This paper refines our previous work on smartphone risk assessment by proposing an approach for assessing the privacy risk of Android users.  ...  The increasing presence of privacy violating apps in app marketplaces poses a significant privacy risk for smartphone users.  ...  needed for the purpose of the collection, (iv) user data must be collected by apps with the knowledge and consent of the individual, (v) user data must not be communicated to third parties, except under  ... 
doi:10.1007/978-3-319-14114-5_2 fatcat:gcfoqbtjk5hyjfvtoqwad2dcny

Research Paper on Enhancing Mobile Security from Vulnerable Attacks

Priyansha Tiwari, Santosh Kumar Singh
2022 International Journal for Research in Applied Science and Engineering Technology  
Thus these bias are the main target of hackers, still on the other hand the Smart phone manufacturers are trying to design stylish security model to overcome all vulnerabilities.  ...  Then we bandy the Android Security armature and possible attacks to android OS and also punctuate the pitfalls which are associated with this particular bias.  ...  Mobile security solutions must be designed to have minimal impact on the user experience.  Privacy by Design: Mobile devices used for work may be BYOD and dual-use devices.  ... 
doi:10.22214/ijraset.2022.43849 fatcat:ld7tdzo7dzfwpp4wda6gr3ew2m

Security Evaluation of IOS and Android

AHMET HAYRAN, MURATCAN İĞDELİ, ATIF YILMAZ, CEMAL GEMCİ
2016 International Journal of Applied Mathematics Electronics and Computers  
The security of these devices is a growing concern and focus point for smartphone users.  ...  In the race of smartphone operation systems, IOS and Android seem to have the big part of pie. Both platforms have grown more enterprise-friendly since about one decade.  ...  Keychain data is protected using a class structure similar to the one used in file Data Protection [12] . For Android, data encryption likes IOS with a few missing.  ... 
doi:10.18100/ijamec.270378 fatcat:zphbltf5xbavvphhvbm2dtwjti

Security of Sensitive Data on Android Smartphones Using Cloud Storage with Reference to Gravitational Search Algorithm

Solomon Babatunde Olaleye
2021 International journal of computer science and mobile computing  
The focus of this paper is to secure sensitive data on smartphones using cloud infrastructure. Nevertheless, the biggest challenge is data security.  ...  The results showed that the work can effectively protect user sensitive data with speed using cloud and when compared with existing works, the results are satisfactory.  ...  Before using the cloud for sensitive data, one must be certain that the cloud provider has a very strong mechanism for protecting sensitive data in its custody.  ... 
doi:10.47760/ijcsmc.2021.v10i03.009 fatcat:r4wz2gvfjzbc3cuhgflww4o2um

Android Application Security [chapter]

Marwan Omar, Derek Mohammed, Van Nguyen, Maurice Dawson, Mubarak Banisakher
2019 Advances in Digital Crime, Forensics, and Cyber Terrorism  
The researcher suggested designing a real time monitoring application to detect and deter malicious apps from compromising users' sensitive data; such application is necessary for Android users to protect  ...  This chapter investigated the scope of this issue and concluded that hackers use malicious apps as attack vectors to compromise Android smartphones and steal confidential data and that no security solutions  ...  It must be noted, however, that Android's sandboxing mechanism makes Android one of the more secure platforms by separating applications and processes from each other and enforcing each app to be executed  ... 
doi:10.4018/978-1-5225-8976-1.ch002 fatcat:kp535lgjjzcvvkkdpbyjtyezna

Investigating Protected Health Information Leakage from Android Medical Applications [article]

George Grispos and Talon Flynn and William Glisson and Kim-Kwang Raymond Choo
2021 arXiv   pre-print
In this study, we forensically focus on the potential of recovering residual data from Android medical applications, with the objective of providing an initial risk assessment of such applications.  ...  In other words, adequate safeguards to protect the user's sensitive information (e.g., personally identifiable information and/or medical history) are required to be enforced on such devices and applications  ...  The statements, opinions, and content included in this publication do not necessarily reflect the position or the policy of the NRI, and no official endorsement should be inferred.  ... 
arXiv:2105.07360v1 fatcat:qjjt5axttnd2hayta7efxtwyia

Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution

Nageen Saleem, Areeba Rahman, Muhammad Rizwan, Shahid Naseem, Fahad Ahmad
2018 EAI Endorsed Transactions on Scalable Information Systems  
The research unleashes the possible ways in which quantum could be effectively embedded in smartphones to resolve certain data security problems.  ...  This paper presents a data security and quality enhancement method based on amalgamating quantum attributes into the Android operating system that could effectively solve the issue raised.  ...  This polarization must be measured at the receiver side.  ... 
doi:10.4108/eai.13-7-2018.165281 fatcat:op6lzjodgvanzpudn2d3772a2q

Understanding Users' Behavior towards Applications Privacy Policies

Salim Ullah, Muhammad Sohail Khan, Choonhwa Lee, Muhammad Hanif
2022 Electronics  
Recently, smartphone usage has increased tremendously, and smartphones are being used as a requirement of daily life, equally by all age groups.  ...  Smartphone operating systems such as Android and iOS have made it possible for anyone with development skills to create apps for smartphones.  ...  Most modern Android smartphones implement the permission-based model to protect their users' sensitive data and prevent their privacy leakage [8] .  ... 
doi:10.3390/electronics11020246 fatcat:e4jsoyjer5ha3mhkh66oqf5jhy

Defending Users against Smartphone Apps: Techniques and Future Directions [chapter]

William Enck
2011 Lecture Notes in Computer Science  
In response, smartphone security research has focused on protecting users from apps.  ...  Smartphone security research has become very popular in response to the rapid, worldwide adoption of new platforms such as Android and iOS.  ...  user to be used on-device only.  ... 
doi:10.1007/978-3-642-25560-1_3 fatcat:q6xhlwtow5geplbbx5dlgef6pi

Survey on Privacy Permission Management Approaches for Android OS Applications

Supriya Shinde, S. S. Sambare
2014 International Journal of Computer Applications  
Smart phones have been becoming popular and mobile users are increasingly relying on them to store and handle personal information.  ...  Mobile users does not understands the meaning of the permissions, so he or she must either accept all of them or waive the application.  ...  The reason behind increased demand for smartphones is the huge availability of applications that can be downloaded and installed easily on smartphones.  ... 
doi:10.5120/18731-9967 fatcat:h5rm55dbp5ft3g6knjlzy3p22e
« Previous Showing results 1 — 15 out of 12,138 results