2022
DOI: 10.1007/978-981-16-7469-3_19
|View full text |Cite
|
Sign up to set email alerts
|

Security Threats and Protection Based on Android Platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The author identified 107 malware families using control and data flow graphs. Wang et al [24] presented an article that provides security threats and an overview of the Android security model. The author presents multiple techniques for improving the security infrastructure for developing secure Android firmware, an information encryption module, virus retrieval, and a mobile phone anti-theft module.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The author identified 107 malware families using control and data flow graphs. Wang et al [24] presented an article that provides security threats and an overview of the Android security model. The author presents multiple techniques for improving the security infrastructure for developing secure Android firmware, an information encryption module, virus retrieval, and a mobile phone anti-theft module.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Despite the employment of many mechanisms at the backend of the system to secure the personal and private data of users, malicious attackers may get access to the data through various methods. The most prevalent and significant attack is ransomware, which involves authorization and authentication on mobile devices (Wang, 2022). Though it is vital to keep data in storage and transit safe from malicious actors, establishing a safe and secure mechanism to access that data is also crucial (Seth et al, 2022).…”
Section: Introductionmentioning
confidence: 99%