Proceedings of 2012 2nd International Conference on Computer Science and Network Technology 2012
DOI: 10.1109/iccsnt.2012.6525958
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 2 publications
0
7
0
Order By: Relevance
“…They can also be used to develop or secondary develop applications that can effectively endanger the privacy and security of smartphone users. Malicious code also It can be repackaged into normal applications and rooting modules, thereby making a security hole into the smartphone operating system [76], [78], [79]. The heterogeneity, security mechanism and management mode of the application store enable mobile malicious programs to survive.…”
Section: E Application Of Market-level Ecosystem Communicationmentioning
confidence: 99%
“…They can also be used to develop or secondary develop applications that can effectively endanger the privacy and security of smartphone users. Malicious code also It can be repackaged into normal applications and rooting modules, thereby making a security hole into the smartphone operating system [76], [78], [79]. The heterogeneity, security mechanism and management mode of the application store enable mobile malicious programs to survive.…”
Section: E Application Of Market-level Ecosystem Communicationmentioning
confidence: 99%
“…It cannot only install an app that the user don't know but also leak private information or lead to billing. Also, update attack has a self-update feature, and can be divided into four main techniques [9]. Drive-by download is a form of remote attack that downloads and executes a malware without the user knowing and mainly user-after-free and Heap Spraying method attack cases are found.…”
Section: A Characteristics Of Malicious Android Applicationsmentioning
confidence: 99%
“…Android Malware Genome Project categorizes 1,260 samples of malicious apps largely by their characteristics to Malware Installation, Activation, Malicious Payloads and Permission Uses [9]. Additionally, we can classify malicious app into Repacking, Update-Attack, Drive-by Download and Standalone [11]- [13] based on its internal activity pattern.…”
Section: A Characteristics Of Malicious Android Applicationsmentioning
confidence: 99%
See 2 more Smart Citations