2015
DOI: 10.1145/2733306
|View full text |Cite
|
Sign up to set email alerts
|

Securing Android

Abstract: Recent years have seen a global adoption of smart mobile devices, particularly those based on Android. However, Android’s widespread adoption is marred with increasingly rampant malware threats. This article gives a survey and taxonomy of existing works that secure Android devices. Based on Android app deployment stages, the taxonomy enables us to analyze schemes that share similar objective and approach and to inspect their key differences. Additionally, this article highlights the limitations of existing wor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 96 publications
(14 citation statements)
references
References 70 publications
0
12
0
Order By: Relevance
“…In particular, La Polla et al [41] surveyed smartphone security threats and their solutions for the period 2004-2011, but has very limited coverage of Android. In the survey papers [29,42,47] the authors focus on the Android platform, but they only perform an informal analysis of the security model. Some work have analyzed the limitations and weaknesses of the Android security model.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, La Polla et al [41] surveyed smartphone security threats and their solutions for the period 2004-2011, but has very limited coverage of Android. In the survey papers [29,42,47] the authors focus on the Android platform, but they only perform an informal analysis of the security model. Some work have analyzed the limitations and weaknesses of the Android security model.…”
Section: Related Workmentioning
confidence: 99%
“…Malicious libraries can then abuse the permissions they are given on behalf of the application and use any number of the malicious attack strategies discussed further on [13].…”
Section: Ad Librariesmentioning
confidence: 99%
“…Unfortunately, the speed and efficiency of new internet technologies is reflected in rising cybercrime [8,13,14]. The financial sector that security has enhanced is no exception on online platforms.…”
Section: Security Issues and Requirementsmentioning
confidence: 99%