作者
Jalal B Hur, Jawwad A Shamsi
发表日期
2017/12/30
研讨会论文
2017 International Conference on Information and Communication Technologies (ICICT)
页码范围
40-46
出版商
IEEE
简介
The use of Smart phones has become very popular around the globe in this digital era and in recent days its user's number has increased at indefinite level, as every one rush to explore the digital world. The people are switching towards Smart phones in order to access many applications such as financial, business, educational and social etc. Therefore these devices are the main target of hackers, however on the other hand the Smart phone manufacturers are trying to design best security model to overcome all vulnerabilities. Here we discuss the Android Security architecture and possible attacks to android OS and also highlight the threats which are associated with these particular devices. This paper describes the vulnerabilities found in Android based Smart phones and also describes the attacks like privilege escalation, privacy attack and other threats which are associated with these particular devices. In last …
引用总数
201820192020202120222023202413910331
学术搜索中的文章