2014
DOI: 10.5815/ijcnis.2014.12.02
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Analysis of Android Security and Proposed Solutions

Abstract: Abstract-The increasing popularity of smart devices have led users to complete all of their daily work with these devices. Users are now able to shop online, share information with the applications that they install on their smart devices. Installed applications gain access to various sensitive information, such as the user's contact list, phone number, location. However, there is no control mechanism in place that can check whether these applications are safe to install. Therefore, applications are installed … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…The Android operating system has a basic security architecture that tries to secure user information and applications. The architecture provides a security model that adopts security in each layer and maintains flexibility in its design because of its open-source nature [2].…”
Section: Android Operating Systemmentioning
confidence: 99%
See 3 more Smart Citations
“…The Android operating system has a basic security architecture that tries to secure user information and applications. The architecture provides a security model that adopts security in each layer and maintains flexibility in its design because of its open-source nature [2].…”
Section: Android Operating Systemmentioning
confidence: 99%
“…According to their results, 60% of the applications only use the INTERNET permission. Some of recent related works that tried to mitigate the Android OS-related threats effects is well summarized in [2] which classified them as follows: 1-Operating System-Based solutions…”
Section: Fig 1: Android Os Basic Architecturementioning
confidence: 99%
See 2 more Smart Citations
“…Although these studies offer insights for our study, they lack certain security and privacy-centric features such as risk analysis, risk scoring, and user-centric services. In our previous study [12], we analyzed these proposed solutions in detail and created a mobile security taxonomy. We also mentioned the need for a user-friendly, device-independent, web-based approach.…”
Section: Introductionmentioning
confidence: 99%